Glossary
ContactAntivirus
Application
Business continuity
Bandwidth
The maximum rate of data transfer across any given path. For example, how much information you receive per second over your broadband connection.
Bit
Bit is short for binary digit. It’s the smallest unit of measurement used to quantify computer data.
Cloud computing
Cyber attack
An attempt to steal data, disable computers or generally hack private information from people’s computers and profiles. These are on the rise and it’s critically important to protect yourself against them.
Cyber Essentials
Cybersecurity
Data breach
Data protection
The protection of data by way of backing up data or having a plan in place to deal with any data disasters, such as breaches or losses. Our JustProtect service is a preventative and reactionary tool against data disaster.
Decryption
Disaster recovery
The recovery of a data breach or data loss, often using a software to re-establish IT infrastructure. You can set up a disaster recovery roadmap here.
Downtime
The time a computer system or machine is out of service or not working. Downtime is all cost and no benefit. It’s essential to minimise it, and that’s why disaster recovery plans are essential.
Firewall
A firewall monitors incoming and outgoing computer traffic, identifying and blocking online threats. It’s a critically important part of your defences against cyber attacks.
Firmware
Firmware is basically software that exists in hardware to help it run. It acts as an interface between hardware and operating systems. Without firmware, almost no electronic devices would work. That’s why it’s essential to keep it up to date through patch management.
Flash drive
A small, portable storage device. It has no moving parts, unlike alternative such as hard drives. Often, this will look like a small USB stick.
FTP (File Transfer Protocol)
A communications protocol used for transmitting files between one computer and another.
Gigabyte
A unit of data, made up of multiple ‘bytes’. You might hear this used to describe the amount of data available, such as on a storage device.
Hacker
Most often associated with malicious activity, a hacker is someone who gains unauthorised access to a computer system to obtain data.
Hardware
Within your IT infrastructure, hardware is all the parts you can physically touch – computers, keyboards, servers, routers and so on.
Host
A device that is connected to a computer network, such as a computer or smartphone.
Hotspot
A wireless access point, which allows devices to connect to the internet on the go.
LAN (Local Area Network)
A network contained within a small geographical location or area. This usually would be the same building.
Malware
An invasive or harmful software, code, or file, often delivered over an internet connection or network, that infects a device or steals data.
Migration
Modem
Motherboard
MSP (Managed Service Provider)
Multi-factor authentication
Multi-step login progress that prompts the user to enter more information than just a password. For example, after entering your password, an authorisation code is sent to a designated mobile number.
One-time password
A password that is only used one time, and only valid for one authentication. Often a code, or an alphanumeric string of characters.
OS (Operating System)
Responsible for executing all processes, file management and other tasks, an operating system is an interface between a user and hardware.
Password management
The process of securing, storing, and managing passwords, creating best practices for users to follow. See how Keeper Security effectively manages your passwords: https://www.arcustechnology.co.uk/password-management/
Patch management
Applying updates to firmware, software, and drivers to protect against vulnerabilities.
Phishing
An online fraud, usually used to trick people into giving out sensitive or confidential information, such as passwords or financial data.
Plug-in
A software program that can be added to a host program to add extra features.
Processor
Proxy server
RAM (Random Access Memory)
Ransomware
Router
Server
Software
Spam
Spyware
A program secretly installed on someone’s computer or other electronic devices that allows the intruder to spy on you, secretly record information or track your online activity. Protect yourself with our defence service, JustSecure.
Trojan horse
Disguised as legitimate code or standard programming. When downloaded onto a computer, a trojan horse contains a malicious function.
Troubleshoot
A problem-solving process used to locate and correct issues with electronics such as devices, or software systems.
Two-factor authentication
The same principle as multi-factor authentication, it requires two forms of identification to access an account or data. This could be a text code or using a third party authenticator app.
Uptime
Indicating that a system is functional, uptime spots the success level on your devices or in systems and hardware.
VPN (Virtual Private Network)
A service that helps your internet connection stay private, and protected, online.
WAN (Wide Area Network)
A network of networks covering a large geographical location and linking smaller networks – such as LANs.
WLAN (Wireless Local Area Network)
A wireless distribution method, which allows two or more devices to be connected wirelessly.