Key Terms Flashcards
Applications (apps)
A type of software that allows a user to perform specific tasks
Utilities
Apps designed to help optimize a computer.
Operating System (OS)
Software that manages the computer’s hardware & software
Platform
The environment on which a piece of software is executed.
Plugin
A component that adds a specific feature to software. Aka extension.
API
application program interface:
communication between software.
Console
A user interface that controls software and/or hardware.
Dashboard
At a glance view of key info relevant to a goal.
Server
A computer or program that provides data to other computers
Domain
A unique name that identifies a website
Directory
Organizes files or data on a hard drive or in a program.
AD (Active Directory)
A directory service developed by MIcrosoft for use on Windows OS. Helps an admin set up users, passwords, and access.
SCIM (System for Cross-domain Identity Management)
Integration service for user provisioning.
Protocol
A specific set of communication rules between computers
Hypertext Transfer Protocol (HtTP)
One of the protocols used to transfer info over the internet.
Hypertext Transfer Protocol Secure (HTTPS)
Secures data by encrypting it.
White Paper
A report that describes how a technology or product solves a problem. Marketing or technical document.
Whitelist
A list of trusted email address, domains and/or internet addresses that are permitted to pass through a system or filter.
SCORM
Shareable Content Object Reference Model
The Six Steps to Successful Security Awareness Training (SAT)
- Have a security policy, and have each employee read and sign it.
- Have all employees take mandatory SAT, with a clear deadline and reasons why they’re taking the training.
- Make SAT part of the onboarding process
- Regularly test employees to reinforce the SAT
- Have employees who fail phishing tests meet privately with a supervisor or HR, reward employees with low failure rates.
- Send regular security hints and tips via email to all employees
7 reasons why an organization should outsource security awareness training
- Reduce costs
- Access to talent
- Geographic reach and scalability
- Compliance
- Mitigate risk
- Business Focus
- Leverage the cost of technology