Innovative Digital Solutions for SMBs

Glossary / Dictionary

Glossary of terms and definitions for IT (Information Technology), the Internet and cyber security.

This glossary provides more than 480 clear and concise definitions of commonly used terms in the fields of information technology, the internet, and cyber security. It is designed to support users of all levels in understanding key concepts, technical jargon, and acronyms frequently encountered across digital platforms and security-related discussions. Whether you are a business owner, student, professional, or simply interested in the digital landscape, this resource aims to enhance your knowledge and confidence in navigating the ever-evolving world of technology.



Hardware

The physical components of a computer system, including internal parts and external devices.

Example: Upgrading the hardware by adding more RAM improved the performance of the laptop.



Hardware Security Module (HSM)

A physical device that securely manages and protects cryptographic keys, performing encryption and decryption operations.

Example: Banks use HSMs to secure customer transaction data and protect encryption keys from theft.



Hardware Trojan

A malicious modification to hardware that can create security vulnerabilities or backdoors.

Example: A compromised microchip in a computer can allow attackers to bypass security measures.



Access Point

A hardware device, such as a router or hub, that allows Wi-Fi enabled devices to connect to a wired network, providing wireless access within a defined area.

Example: The university installed multiple access points to ensure stable Wi-Fi coverage across campus.

See also: Wi-Fi, Peripheral, Hardware



Backdoor / Back Door

A hidden method within software, hardware, or a system that allows someone to bypass normal authentication or security controls. Backdoors can be intentionally coded by developers for maintenance purposes or maliciously created by attackers to gain unauthorised access.

Example: A software developer includes a backdoor for troubleshooting, while a hacker might install a backdoor in a compromised server to maintain covert access.



BIOS (Basic Input/Output System)

Firmware stored on a motherboard chip that initialises hardware during the startup process before handing control to the operating system.

Example: She updated the BIOS to improve hardware compatibility.

See also: POST (Power-On Self-Test)



Boot

Boot refers to the process of starting a computer and loading the operating system into memory from the hardware's initial power-on state.

Example: After turning on the computer, the BIOS performs a POST and then boots into the installed operating system from the SSD.

See also: POST (Power-On Self-Test)



Device

Any hardware component that can connect to or be used with a computer system, including input, output, and storage devices.

Example: A printer is a common output device connected to a computer to produce hard copies of digital documents.

See also: Peripheral, Hardware



Driver

A software program that allows the operating system to communicate with hardware devices, enabling proper functionality.

Example: After installing a new graphics card, the user downloads the latest driver to ensure compatibility with games.



Event Log

A system-generated file that records events related to hardware, software, or security on a device or network for diagnostic and monitoring purposes.

Example: The administrator checked the event log after the system crash.



Firewall

A security system (hardware or software) that monitors and controls incoming and outgoing network traffic based on security rules.

Example: Your home router may have a firewall that only allows authorised traffic through.



Firmware

Software permanently installed on a hardware device that controls its low-level functions and can be updated for improvements or fixes.

Example: The printer's firmware was updated to fix a bug.



Gateway

A hardware or software component that acts as a bridge between different networks, managing traffic and translating protocols.

Example: The network gateway provided access to the internet.



Installation

This is the process of setting up software or hardware so that it can function correctly on a computer system.

Example: The IT team performs the installation of software on all company laptops.



Interface

A point of interaction where two systems, such as software and hardware, or software components, communicate and exchange information. In user computing, it often refers to the graphical layout through which users interact with a device or application.

Example: The app's user interface was clean and intuitive.



Kernel

The core component of an operating system that manages hardware and system resources.

Example: The Linux kernel received a major update.



Keylogger

Malicious software or hardware that records every keystroke made on a device, often used to capture passwords, credit card details, or other sensitive information.

Example: A cyber criminal installs a keylogger on a public computer, capturing login details from unsuspecting users.



Motherboard

The main printed circuit board (PCB) in a computer that connects and allows communication between the CPU, memory, storage devices, and other hardware components.

Example: Upgrading the motherboard improved the computer's overall performance and compatibility.

See also: Hardware



Network Interface Card (NIC)

A hardware component that connects a computer or device to a network, enabling communication over wired or wireless connections.

Example: The technician installed a new NIC to upgrade the computer's network capabilities.

See also: Network, Hardware



Network Switch

A hardware device that connects devices on a local area network (LAN) and uses MAC addresses to forward data to the correct destination.

Example: The office network uses a switch to connect multiple computers and printers for efficient communication.

See also: Network, Hardware



Off-site Backup

A copy of data that is stored at a different physical location from the original, used to protect against data loss due to disasters, theft, or hardware failure.

Example: The company regularly performs off-site backups to cloud storage to ensure data safety.

See also: Backup



Operating System (OS)

System software that manages computer hardware and software resources, providing a platform for applications to run and offering user interfaces for interaction. Examples include Windows, macOS, and Linux.

Example: The laptop's operating system was upgraded to the latest version for better performance.



Platform

A hardware or software environment in which applications run. This can include operating systems, cloud services, or hardware devices.

Example: The app was developed for both Android and iOS platforms.

See also: Operating System



POST (Power-On Self-Test)

This is a diagnostic testing sequence run by a computer's BIOS when the machine is powered on to check hardware components such as RAM, CPU, and storage devices.

Example: When a user turns on their PC and hears a single beep, it indicates the POST has completed successfully.

See also: Boot, BIOS



Power Cycle

Power Cycle is the process of turning a device off and then back on again to reset or troubleshoot hardware or software issues.

Example: The user performs a power cycle on the modem to resolve a connection issue.



PSU (Power Supply Unit)

A hardware component that converts electrical power from an outlet into usable power for a computer's internal components.

Example: The PSU failed, causing the computer to shut down unexpectedly.

See also: UPS, Hardware



RMM (Remote Monitoring and Management)

A software solution that allows IT service providers to remotely monitor, manage, and maintain an organisation's IT infrastructure, including computers, servers, and networks.

Example: An IT provider uses RMM software to monitor the health of a client's servers, automatically deploying security patches and detecting hardware failures before they cause downtime.



Software

The programs and operating systems that run on computer hardware and perform specific tasks or functions.

Example: Libre Office is software used for word processing.



Token

A digital object used to authenticate users and grant access to systems or services. Tokens can be hardware-based or software-based.

Example: When logging into a secure system, a user may receive a one-time token via a mobile app for verification.



UEFI (Unified Extensible Firmware Interface)

A modern firmware that initializes hardware during the boot process and provides an interface between the operating system and platform firmware, replacing the legacy BIOS.

Example: A new laptop uses UEFI to support faster boot times and larger hard drives compared to older BIOS systems.

See also: Boot, BIOS



Virtualisation

The process of creating virtual versions of hardware, storage, or networks to improve efficiency and security.

Example: A server hosts multiple virtual machines to allow different operating systems to run simultaneously.

See also: VM (Virtual Machine)



VM (Virtual Machine)

A software-based simulation of a physical computer that allows multiple operating systems to run on the same hardware.

Example: Developers use a virtual machine to test a new application on Windows while running a Mac.

See also: Virtualisation