DeepTech IT Glossary

Access Point (AP)

A device that allows wireless-equipped computers and other devices to communicate with a wired network.

Active Directory (AD)

Active Directory is Microsoft’s system for managing and organizing network resources, such as users, computers, and printers. It enables centralized user authentication, access control, and policy enforcement. AD supports hierarchical structures like domains and organizational units, which help IT teams manage large networks efficiently. It’s widely used in enterprise environments for its scalability and security features.

Alias

A short, easy to remember name created for use in place of a longer, more complicated name; commonly used in e-mail applications. Also referred to as a “nickname”.

Application Management

Application management ensures that all business-critical software is properly installed, updated, configured, and secured. It also includes license tracking, user training, and compatibility management. Ongoing application oversight helps ensure optimal performance and compliance.

Authentication

The process of identifying yourself and the verification that you’re who you say you are. Computers where restricted information is stored may require you to enter your username and password to gain access.

Backup

Backups are secure copies of your data stored separately to protect against loss due to hardware failure, deletion, or cyberattacks. They can be local, cloud-based, or hybrid. Automated, encrypted backups are essential components of business continuity and disaster recovery planning.

Bandwidth

Bandwidth is the maximum rate at which data can be transferred across a network in a given time, typically measured in Mbps or Gbps. More bandwidth allows faster uploads, downloads, and smoother performance. Bandwidth is critical for activities like streaming, conferencing, and large file transfers.

Basic Input/Output System (BIOS)

BIOS is the firmware that initializes a computer’s hardware and launches the operating system. It performs system checks and determines the boot sequence. Though being replaced by Unified Extensible Firmware Interface (UEFI) in newer systems, BIOS still plays a foundational role in older hardware.

Botnet

A botnet is a collection of internet-connected devices infected with malware and remotely controlled by a cybercriminal. These devices are used to carry out large-scale attacks such as a Distributed Denial of Service (DDoS), spam, or credential stuffing. Protecting against botnets involves proper firewall rules, endpoint protection, and updated security patches.

Business Continuity Plan (BCD)

Business Continuity Plan, or “BCP,” is a set of documents, instructions, and procedures which enable a business to respond to accidents, disasters, emergencies, and/or threats without any stoppage or hindrance in its key operations. It is also called a business resumption plan, disaster recovery plan, or recovery plan.

Cache

Cache is a temporary storage area used to speed up access to frequently accessed data. It improves system and application performance by reducing the time needed to retrieve data from slower storage. Caches can be found in CPUs, browsers, and servers.

Cloud computing

A general term used to describe Internet services such as social networking services (e.g., Facebook and Twitter), online backup services, and applications that run within a Web browser. Cloud computing also includes computer networks that are connected over the Internet for server redundancy or cluster computing purposes.

Cybersecurity

Cybersecurity encompasses the practices and technologies used to protect data, systems, and networks from cyber threats. It includes firewalls, encryption, user training, and threat detection. A strong cybersecurity strategy is essential to defend against data breaches and malware.

Data Breach

A data breach occurs when sensitive information is accessed, copied, or exposed without authorization. Common causes include hacking, human error, and insufficient security. The consequences can be severe, including financial loss, reputational damage, and legal penalties.

DHCP

Dynamic Host Configuration Protocol; a protocol that lets a server on a local network assign temporary IP addresses to a computer or other network devices.

Dynamic Host Configuration Protocol; a protocol that lets a server on a local network assign temporary IP addresses to a computer or other network devices.

Disaster Recovery

Disaster recovery involves predefined plans and tools that restore systems and data following major disruptions. It includes backup schedules, failover strategies, and role assignments to ensure business continuity. A comprehensive disaster recovery plan minimizes downtime and data loss.

Distributed Denial of Service (DDoS)

A DDoS attack floods a system with traffic from multiple sources, making services slow or unavailable. It often uses botnets to overwhelm websites or servers. Mitigation includes traffic filtering, rate limiting, and using content delivery networks.

Domain Name System (DNS)

DNS translates domain names (like example.com) into IP addresses so devices can locate each other on the internet. It’s essential to web browsing and email delivery. DNS failures can disrupt service, making monitoring and security crucial.

Encryption

Encryption is a method of converting readable data into an unreadable format using cryptographic algorithms. Only users with the proper decryption key can access the original data. It’s vital for protecting sensitive information in transit and at rest.

Endpoint Protection

Endpoint protection secures devices like laptops, desktops, and smartphones against cyber threats. It includes antivirus software, behavioral monitoring, and policy enforcement. A strong endpoint protection strategy complements broader network security.

Failover & Failback

Failover is the automatic switch to a backup system when the primary one fails. Failback is the process of returning to the original system once it’s stable. These functions are key to high-availability systems and disaster recovery.

Firewall

A firewall filters traffic between networks to block malicious access while allowing legitimate communications. Firewalls can be hardware or software-based and are often used in layered security architectures. They are fundamental to preventing intrusions.

Flash Memory

A type of memory that retains information even after power is turned off; commonly used in memory cards and USB flash drives for storage and transfer of data between computers and other digital products.

FTP

File Transfer Protocol; a method of exchanging files between computers via the Internet. A program like WS_FTP for IBM PC or compatibles or Fetch for Macintosh is required. Files can contain documents or programs and can be ASCII text or binary data.

Host

A computer accessed by a user working at a remote location. Also refers to a specific computer connected to a TCP/IP network like the Internet.

HTTP

HyperText Transfer Protocol; a set of instructions that defines how a web server and a browser should interact. Example: When you open a location (e.g., enter a URL) in your browser, what actually happens is an HTTP command is sent to the web server directing it to fetch and return the requested web page.

Hyperlink

Connects one piece of information (anchor) to a related piece of information (anchor) in an electronic document. Clicking on a hyperlink takes you directly to the linked destination which can be within the same document or in an entirely different document. Hyperlinks are commonly found on web pages, word documents and PDF files

Hypertext

Data that contains one or more links to other data; commonly seen in web pages and in online help files. Key words usually are underlined or highlighted. Example: If you look for information about “Cats” in a reference book and see a note that says “Refer also to Mammals” the two topics are considered to be linked. In a hypertext file, you click on a link to go directly to the related information.

IEEE 1394 port

An interface for attaching high-speed serial devices to your computer; IEEE 1394 connectors support plug and play.

IMAP

Internet Message Access Protcol. A method of accessing e-mail messages on a server without downloading them to your local hard drive; it is the main difference between IMAP and POP3 which requires messages to be downloaded to a user’s hard drive before the message can be read.

Internet Protocol (IP) Address

An IP address is a unique number assigned to every device on a network. It enables communication between systems and helps route internet traffic. There are IPv4 and IPv6 standards, the latter offering more addresses for a growing number of devices.

Intrusion Detection/Prevention System (IDS/IPS)

An IDS monitors networks for signs of intrusion and alerts administrators. An IPS not only detects threats but also blocks them in real time. These systems are important components of modern network security.

ISP

Internet Service Provider; an organization or company that provides Internet connectivity.

Kernel Panic

A kernel panic is a system crash that occurs when the operating system detects a fatal error it can’t safely recover from. It may result in a system reboot or complete shutdown. Kernel panics are often related to hardware issues or incompatible drivers.

Local Area Network (LAN)

A LAN connects computers and devices within a limited area like a home or office. It allows resource sharing and centralized internet access. LANs are typically secure, fast, and managed internally by IT teams.

Load Balancer

A load balancer distributes incoming network traffic across multiple servers to prevent overload. It improves performance, availability, and fault tolerance. Load balancing is critical for applications with high traffic or uptime requirements.

Media Access Control (MAC) Address

A MAC address is a unique identifier assigned to a network interface card (NIC). It is used to identify devices on a local network and can help control access through filtering and whitelisting.

Malware

Malware is software designed to harm or exploit devices, networks, or users. It includes viruses, ransomware, spyware, and trojans. Anti-malware tools and user awareness are essential for preventing infections.

Mobile Device Management (MDM)

MDM software allows IT teams to manage mobile devices across an organization. It supports features like remote wipe, app management, and compliance enforcement. MDM is key to securing ‘Bring Your Own Device’ and remote work environments.

NAT

Network Address Translation; a standard that enables a LAN to use a set of IP addresses for internal traffic and a single IP address for communications with the Internet.

Network

A group of interconnected computers capable of exchanging information. A network can be as few as several personal computers on a LAN or as large as the Internet, a worldwide network of computers.

Operating System (OS)

An OS is the foundational software that manages hardware and runs applications on a device. Examples include Windows, macOS, and Linux. The OS handles memory, processes, files, and user interfaces.

Packet

A unit of transmission in data communications. The TCP/IP protocol breaks large data files into smaller chunks for sending over a network so that less data will have to be re-transmitted if errors occur.

Patch Management

Patch management involves deploying updates to software and systems to fix vulnerabilities or improve performance. It helps prevent exploits and keeps systems secure and compliant. Automation tools can streamline the patching process.

Phishing

Phishing is a cyberattack that tricks users into revealing sensitive information through fake emails or websites. It can lead to account compromise or malware infection. User training and email filtering are primary defenses.

POP

Post Office Protocol; a method of handling incoming electronic mail. Example: E-mail programs may use this protocol for storing your incoming messages on a special cluster of servers called pop.service.ohio-state.edu and delivering them when requested.

Provisioning

Provisioning refers to the process of preparing IT resources for new users, including hardware setup and software configuration. It ensures smooth onboarding and consistent access to required tools and systems.

Proxy

Refers to a special kind of server that functions as an intermediate link between a client application (like a web browser) and a real server. The proxy server intercepts requests for information from the real server and whenever possible, fills the request. When it is unable to do so, the request is forwarded to the real server.

Random Access Memory (RAM)

RAM is the memory a computer uses to store temporary data for active applications. More RAM allows better multitasking and performance. It resets when the computer is powered off.

Ransomware

Ransomware is a type of malware that encrypts files and demands payment for decryption. It can halt business operations and cause major data loss. Backups and strong endpoint defenses help protect against it.

Recovery Point Objective (RPO)

RPO is the maximum acceptable amount of data loss measured in time. It determines how often backups should be performed. A shorter RPO means less potential data loss.

Recovery Time Objective (RTO)

RTO is the maximum allowable downtime after a system failure before significant impact occurs. It guides recovery strategies and resource allocation. Lower RTOs require faster and more robust solutions.

Remote Desktop

Remote desktop software allows users to control a computer from another location. It enables remote work, support, and server access. Secure connections and user authentication are essential for protection.

RJ-45 connector

An eight-wire connector used for connecting a computer to a local-area network. May also be referred to as an Ethernet connector.

Router

A router connects different networks and routes data between them, most commonly between a home or business and the internet. It often includes security features like firewalls and Wi-Fi management.

SATA

Serial Advanced Technology Attachment or Serial ATA. An interface used to connect ATA hard drives to a computer’s motherboard that provides a better, more efficient interface; Serial ATA is likely to replace the previous standard, Parallel ATA (PATA), which has become dated.

Security Token

A small device used to provide an additional level of authorization to access a particular network service; the token itself may be embedded in some type of object like a key fob or on a smart card. Also referred to as an authentication token.

Serial port

An interface on a computer that supports transmission of a single bit at a time; can be used for connecting almost any type of external device including a mouse, a modem, or a printer.

Server

A computer that is responsible for responding to requests made by a client program (e.g., a web browser or an e-mail program) or computer. Also referred to as a “file server”.

SMTP

Simple Mail Transfer Protocol; a method of handling outgoing electronic mail.

TCP/IP

Transmission Control Protocol/Internet Protocol; an agreed upon set of rules that tells computers how to exchange information over the Internet. Other Internet protocols like FTP, Gopher, and HTTP sit on top of TCP/IP.

Token

A group of bits transferred between computers on a token-ring network. Whichever computer has the token can send data to the other systems on the network which ensures only one computer can send data at a time. A token may also refer to a network security card, also known as a hard token.

Two Factor Authentication

An extra level of security achieved using a security token device; users have a personal identification number (PIN) that identifies them as the owner of a particular token. The token displays a number which is entered following the PIN number to uniquely identify the owner to a particular network service. The identification number for each user is changed frequently, usually every few minutes.

USB

Universal Serial Bus; a connector on the back of almost any new computer that allows you to quickly and easily attach external devices such as mice, joysticks or flight yokes, printers, scanners, modems, speakers, digital cameras or webcams, or external storage devices. Current operating systems for Windows and Macintosh computers support USB, so it’s simple to install the device drivers. When a new device is connected, the operating system automatically activates it and begins communicating. USB devices can be connected or disconnected at any time.

User Profile

A user profile stores a person’s settings, preferences, and access permissions on a system. It allows multiple users to operate a device independently. User profiles enhance security and customization.

Vendor Management

Vendor management involves overseeing third-party providers to ensure service quality, cost-efficiency, and compliance. It includes contract negotiation, performance evaluation, and relationship management.

Virtual Chief Information Officer (vCIO)

A vCIO offers executive-level IT leadership without the cost of a full-time CIO. They help align technology with business goals and provide strategic planning, budgeting, and project oversight.

VoIP

Voice over Internet Protocol; a means of using the Internet as the transmission medium for phone calls. An advantage is you do not incur any additional surcharges beyond the cost of your Internet access.

Virtual Private Network (VPN)

A VPN creates an encrypted tunnel between a device and a private network, ensuring secure data transmission. A VPN is commonly used for remote access and protecting user privacy on public networks.