B
- Beamforming
- Beamforming directs a wireless signal to a specific device instead of broadcasting it. Beamforming improves speed and reliability.
- Border-gateway protocol (BGP)
- Border Gateway Protocol allows large, autonomous internet systems to share routing and reachability information.
C
- Cloud Computing
- The usage of hosted services, such as data storage, servers, databases, networking, applications, services, software Internet of Things (IoT), machine learning (ML), and artificial intelligence (AI), through the Internet is known as “cloud computing.” The data is kept on actual servers that a cloud service provider manages.
D
- DHCP
- DHCP, an IP-network protocol, allows a server to automatically assign networked devices IP addresses and provide other information so they can connect efficiently with other endpoints.
- DNS
- DNS resolves Web site names to their IP addresses, improving efficiency and security.
- Data
- the electrical signals that make up the numbers or symbols that a computer processes, stores, and sends.
E
- Elasticity
- Elasticity, in cloud computing, is the capability of a system to respond to fluctuating workload demands by dynamically allocating and reallocating shared resources.
F
- Firewall
- Network firewalls are most businesses’ perimeter security, although they’ve evolved into proxy, stateful, Web app, and next-generation versions.
G
- Gateway
- a connection that allows two networks to communicate by translating between their own protocols, codes, and data formats.
H
- Hybrid cloud
- Private + Public Cloud : A hybrid cloud is a computer platform that utilizes both public and private clouds in a networked environment.
- Hypervisor
- A hypervisor is a software that separates the operating system and applications on a computer from the underlying physical hardware, allowing the hardware to be used by multiple virtual machines.
I
- Identity-based networking
- Using identity-based networking, a user’s ability to access certain networked services is directly tied to that user’s identity.
- Infrastructure-as-a-service (IaaS)
- In this model, the service provider stores and manages the infrastructure and then makes it available to consumers on demand. Provides on-demand access to computing, storage, and networking resources in the cloud.
- Intent-based networking
- Intent-based networking (IBNS) is network management that lets managers describe what they want the network to do in plain language and have a network-management platform automatically configure devices to generate the desired state and enforce policies.
- Internet of things (IoT)
- The internet of things (IoT) is a network of smart devices that gives businesses rich operational data. It refers to the expanding number of electronics that aren’t computers but are connected to the internet to gather data or receive instructions.
K
- Keylogger
- Keyloggers are spyware that records every keystroke on a computer.
L
- Load Balancing
- Spreading computational workloads over multiple servers. In cloud computing, a load balancer functions as a reverse proxy to disperse application traffic to several servers to avoid single points of failure.
M
- MU-MIMO
- Routers and endpoint devices enable a wireless technique called MU-MIMO, which stands for “multi-user, multiple input, multiple output.” Multi-user MIMO (MU-MIMO) is the successor to single-user MIMO (SU-MIMO), also known simply as MIMO.MIMO technology was developed to help improve the number of concurrent users a single access point can support.
- Microsegmentation
- Microsegmentation divides networks, data centers, and cloud deployments into protected zones so only authorized users and application can access each segment.
- Microservices
- Complex applications are developed from a series of small, independently deployable services using microservices or microservice architecture. Microservices may be deployed and scaled separately and written in multiple languages.
- Multi-Tenancy
- Multi-Tenancy refers to a software operating paradigm in which many instances of an application (or multiple apps) operate concurrently in a shared data center ( Cloud computing ).
- Multi-cloud
- In a multi-cloud setup, you manage resources and security across two or more public cloud service providers
N
- Narrowband IoT (NB-IoT)
- NB-IoT allows IoT devices to function across carrier networks in an existing GSM bandwidth utilized by some cellular services, in an underused “guard band” between LTE channels, or independently.
- Network
- A network is a group of connected computers, servers, and networking devices that share resources.
- Network access control (NAC)
- Network Access Control (NAC) is a method that aims to integrate endpoint security, user/system authentication, and network security enforcement.
- Network address
- Network node or host identifier. Addresses on a network are intended to be completely unique identifiers for every device connected to that network.
- Network attached storage (NAS)
- File-level storage that is networked to facilitate data access and file sharing in a distributed client/server architecture is known as network-attached storage (NAS).
- Network host
- Any network-accessible device that is is what we call a host.
- Network security
- Network security policies, processes, and practices prevent, detect, and monitor unauthorized access, misuse, modification, or denial of service on computer networks and network-accessible resources.
- Next-generation firewall (NGFW)
- Intrusion prevention systems, deep-packet inspection, and SSL inspection are integrated into next-generation firewalls to protect network perimeters.
- Nodes
- the computing devices on a network,
- Non-volatile memory express (NVMe)
- NVMe, a protocol designed for all-flash storage, improves performance and density. It’s designed for latency-sensitive enterprise workloads like real-time data analytics and online trading platforms.
O
- Open RAN (O-RAN)
- Software-defined technologies and vendor-neutral hardware are used in O-RAN to design and build 5G radio access networks.
P
- Platform as a service (PaaS)
- A full-fledged cloud-based setting for creating, deploying, and maintaining software applications, including all the necessary tools and infrastructure.
- Power over Ethernet (PoE)
- PoE supplies electricity to networked devices via data cabling
- Private cloud
- A private cloud represents a company’s data center and is managed by you. Simply traditional infrastructure
- Public cloud
- Name itself elaborating on the characteristics of clouds. A third-party cloud provider creates, manages, and maintains a public cloud.
R
- Routers
- Routers connect packet-switched networks. It forwards data packets to their intended IP addresses and allows numerous devices to share an Internet connection.
S
- Secure Socket Layer (SSL)
- SSL creates an encrypted connection between a web server and a browser.
- Secure access service edge (SASE)
- Secure access service edge (SASE) is a cloud service that combines SD-WAN and security to simplify WAN implementation, enhance efficiency and security, and offer suitable bandwidth per application.
- Software Stack
- A software stack is a collection of apps that cooperate with one another in a predetermined hierarchy in order to accomplish a given objective.
- Software as a service (SaaS)
- Software distribution models that allow end-users to access and utilize cloud-based applications via an online connection and pay for such services on an ongoing subscription basis are what we call “software as a service.”
- Software-defined networking (SDN)
- SDN improves network performance and monitoring by enabling dynamic, programmatically efficient network setup. It allows network-wide modifications without manually reconfiguring each device by separating the network management layer from the data layer.
- Split tunneling
- Split tunnelling is a device setup that sends only traffic destined for corporate resources through the organization’s internet VPN and directs the rest to other internet sites.
- Storage-area network (SAN)
- Dedicated, high-speed storage-area networks (SANs) provide block-level storage. SANs separated storage traffic from the LAN to increase application availability and performance.
U
- User Experience (UX)
- user experience (UX) describes how users engage with and experience a product.
- User Interface (UI)
- User interface, often known as UI, refers to the means through which a user communicates with a computer system.
- User Space
- The portion of a computer’s memory dedicated to running applications.
V
- Vulnerability
- Vulnerabilities are flaws in computer programmes that may be used by hackers to gain unauthorised access to a system.
W
- Web Application Firewall (WAF)
- A web service’s HTTP traffic is filtered, monitored, and blocked by a WAF. HTTP traffic inspection can prevent SQL injection, cross-site scripting (XSS), file inclusion, and inappropriate system setup attacks on online applications.
Z
- Zero-day Exploit
- To put it simply, a zero-day vulnerability is a flaw in a system or device that has been discovered but not yet patched. Zero-day vulnerabilities are exploited using zero-day exploits.
- Zero-touch Provisioning or Deployment
- Zero Touch Provisioning (ZTP) lets new devices configure and update themselves without human interaction.
- zero-day attack
- When a zero-day exploit is used to compromise a system and extract sensitive information, the result is known as a zero-day attack.
- zero-day vulnerability
- Attackers find zero-day vulnerabilities in software before the vendor does. Zero-day vulnerabilities are unpatched since vendors don’t know about them.