Title: Important Terminology for the Users of Web-based Services
1Important Terminology for the Users of Web-based
Services
2Table of Contents
- Access point, Alias, Authentication
- Application Programming Interface (API), APT
Threats - Bandwidth, Blockchain, Break/Fix, BYOD
- Cache, Cloud
- Cookies, Content Management System
- Cross-platform Software, Cascading Style Sheets
(CSS) - Database, Data center, Data Loss Prevention
- DHCP, DNS, Domain, Domain Name, Disaster Recovery
- Edge Computing, Encryption, Endpoint Security,
Ethernet
3 Access point, Alias, Authentication
- Access point An access point refers to a device
which enables the communication of
wireless-equipped computers and other devices
with a wired network. - Alias An alias, which is also referred to as a
nickname, is usually used in e-mail
applications. It is an easy to remember name that
is meant to be used for a more complicated and
lengthier name. - Authentication Authentication is the process
that caters to verification of the identity of a
user or a process. In it, a set of credentials
serve the purpose of identification by being
associated with an incoming request.
4Application Programming Interface (API), APT
Threats
- Application Programming Interface (API) An
application programming interface refers to a
computing interface which specifies interactions
among multiple intermediaries of software. It can
be designed as per some industry-standard or it
can be specific to a component or custom. Modular
programming is enabled by an API. This lets users
use an application programming interface
independently of the implementation - APT APT refers to an advanced persistent threat.
It usually refers to a state-sponsored group
which presents a threat by enabling unauthorized
access to a network and by successfully remaining
undetected for a long duration.
5Bandwidth, Blockchain, Break/Fix, BYOD
- Bandwidth Bandwidth refers to the amount of data
which is capable of being transmitted over a
network at any particular time. If a networks
bandwidth is high then it implies that the volume
of data that can be transmitted is high. It is
usually measured in bps (bits per second). - Blockchain A blockchain refers to a specific
type of database which stores data in blocks
which are chained. In it, every block has a
cryptographic hash of the timestamp and
transaction data of the previous block. Its
design renders it resistant to alterations in
data. - Break/Fix Break/fix is an IT service model
through which IT services that are provided are
billed on an as-needed basis. In it the client is
billed only for the work done and doesnt have to
pay any fixed fee for the ongoing service. - BYOD BYOD refers to Bring Your Own Device and
is a policy related to business and technology
which lets employees use their personal mobile
devices for accessing company data. -
61-800-123 -8156
- Whoa! Thats a big number, arent you
proud?
7 Cache, Cloud
- Cache A cache refers to a set of files that are
saved on ones hard disk and aid ones browser
with regard to displaying those pages more
quickly that have been visited previously. - Cloud A cloud makes it possible to have computer
system resources on-demand availability. Clouds
can be restricted to the use of a single company.
In this case these are referred to as enterprise
clouds. Clouds can be available for the use of
multiple companies, wherein these are known as
public clouds. Clouds refer to servers that can
be accessed over the Internet along with the
databases and the software that run on such
servers. A cloud enables its users to access
applications and files from any device at any
time. - To digress, clouds are used in cloud hosting.
Cloud hosting is a type of web hosting service
which makes it possible to access websites over
the Internet. This service is provided by web
hosting companies and the most popular web
hosting companies are usually referred to as the
Best Cloud Hosting Company, the Best Website
Hosting Company, the Best Windows Hosting
Company etc.
8 Cookies, Content Management System
- Cookies Cookies refer to text files that have
data that serve to identify ones computer when
one is using a computer network. Cookies get
created when one uses ones browser to visit a
site which uses cookies to track visitors
movement within the website. Moreover, cookies
aid in resuming a visitors browsing on that
site, storing his/her login details, preferences
as well as customization functions. - Content Management System CMS is the
abbreviation for Content Management System. It is
essentially a software through which users can
create, manage as well as modify a websites
content easily without being dependent on any
technical know-how. It is a tool for building
websites that eliminates the dependency on
writing codes for this purpose. It is software
platform which enables the creation of web
content and its editing, archiving, reporting,
publishing, distribution etc.
9Cross-platform Software, Cascading Style Sheets
(CSS)
- Cross-platform Software A cross-platform
software refers to a computer software which has
been implemented on many computing platforms.
Such a software can be of two types. One of these
needs individual compilation for every platform
that it supports. The other type is capable of
being run directly on any platform without the
need for any special preparation. - Cascading Style Sheets (CSS) A CSS is used to
style web documents. Cascading Style Sheets is a
style sheet language which specifies the
presentation of a document that is written in a
markup language. It enables the separation of
content and presentation.
10Database, Data Center, Data Loss Prevention
- Database A database refers to data that exist in
an organized collection. It is usually stored and
accessed electronically. A database renders data
management easy. - Data Center A data center refers to a physical
facility which is used by businesses for housing
their critical data and applications. A data
center delivers shared data and applications
through a network of resources that are related
to computing and storage. - Data Loss Prevention (DLP) DLP is the
abbreviation for Data Loss Prevention and refers
to a collection of processes along with the tools
that are meant to prevent the loss of data,
unauthorized access to data and the misuse of
data. DLP tools monitor as well as control
endpoint activities. It is meant to protect data
that is in motion while in network traffic or in
use which include endpoint actions or at rest
during data storage.
11DHCP, DNS, Domain Name, Disaster Recovery
- DHCP DHCP is the abbreviation for Dynamic Host
Configuration Protocol. It is a protocol for
network management through which a server that is
on a local network is able to assign temporary IP
addresses to network devices, such as computers. - DNS DNS is the abbreviation for Domain Name
System, which refers to a hierarchical naming
system for resources that use the Internet or a
private network. A DNS uses a decentralized
naming system. It converts domain names to their
corresponding numerical IP addresses. It serves
the function of locating as well as identifying
devices and services with the underlying network
protocols. It assigns domain names and maps those
to respective Internet resources. This is
attained through the allocation of authoritative
name servers for every domain. Moreover, it
specifies the DNS protocol. - Domain Name A domain name is a websites address
which is typed in the browser URL bar for
accessing the website. - Disaster Recovery Disaster recovery, as an area
of security planning, includes policies,
procedures and tools that aid in the recovery and
proper continuation of essential technology
infrastructure post an untoward incident, such as
a natural or man-made disaster.
12Edge Computing, Encryption, Endpoint Security,
Ethernet
- Edge Computing As a distributed computing
paradigm, edge computing, serves to bring data
storage as well as computation closer to the
location where it is required. This not only aids
in improving response time but also saves
bandwidth. - Encryption Encryption refers to the process of
encoding information. The process of encryption
renders readable text into an undecipherable form
that can be decrypted via a decryption key. It
ensures data security which is crucial for
sensitive information. In encryption, the
original representation of any information
(plaintext) is converted into another form
(ciphertext). A ciphertext can be converted into
plaintext by authorized parties in order to
access the original form of the information. - Endpoint Security Endpoint security ensures the
protection of networks, which are bridged to
clients devices remotely. Endpoints on a network
or in a cloud are protected against cyberattacks
through systems that have to do with endpoint
security. - Ethernet Ethernet refers to a type of
communication protocol which connects computers
that exist within a LAN (Local Area Network) or a
WAN (Wide Area Network).
13 Thanks!