Vocab Drills Flashcards
Application
A type of software that allows users to perform specific tasks and activities.
Example: Web browsers, picture viewers and games are all applications
Utilities
Applications designed to help analyze, configure, optimize or maintain a computer. Unlike applications software (which focuses on benefiting the user) utilities are used to support the computer
Example: An application that allows you to customize how the button work on your mouse
Operating System
Software that manages the computer hardware and software. It is system between the application and hardware
Platform
The environment in which a piece of software is executed. It may be the hardware, operating system, a web browser or other underlying software.
For example, Microsoft Windows is a platform for MS Word
feature
a distinctive characteristic of software or hardware
Example: facial recognition is a feature of the Iphone X
plugin
A component that adds a specific feature to software. Also referred to as an extension.
Example: you can add a plugin to your web browser that allows you to change the theme colors.
Software as a Service
Software licensed on a subscription basis. The software is stored centrally on a server. It’s sometimes referred to as “on-demand” software.
Example: Google apps are SaaS
API (Application Program Interface)
A set of clearly defined methods of communication between software.
Console
A user interface that manages and controls software and/or hardware.
Example: KnowBe4 customers access our products through a console
Dashboard
-At-a-glance, goal, grapical images
At-a-glance view of key info, relevant to a particular goal or business objective. They are often displayed as charts and/or other graphical images on a web page
Example: KnowBe4 uses dashboards to display sales data on monitors placed around the company.
Server
A computer or program that manages access to centralized resources.
Example: A file server would store and manage all the user files for a group of computers and users.
Domain
Short for “domain name” a unique name that identifies a website
Example: KnowBe4.com is the domain for KB4
Directory
- Like physical folders a directory organizes files or data on a hard drive in a program. Directories can contain other directories, which are then called sub-directories.
Most operating systems display directories as folders. - Software that stores all resources on a network. Example resources are users , groups, permissions, devices and management policies. A directory is also reffered to as a directory service.
Example: When a directory is given a username, it will return the profile of the user which may include permissions for data access as well as employee information.
AD (Active Directory)
A directory service developed by Microsoft for use on Windows operating systems.
If you were in charge of all computers on a network that are using a Windows server you would use AD to set up the users, their passwords and what devices they could access.
Protocol
A specific set of communication rules between computers
Example: A web browser accessing a website will have a different protocol than an email server talking to an email application
HTTP (Hypertext Transfer Protocol)
One of the protocols used to transfer information over the Internet
HTTPS (Hypertext Transfer Protocol Secure)
The same as HTTP but secure. This protocol secures the data by changing it to a special code that requires special translation. If you were inputting credit card data on a website, you would want that data to transmit securely using HTTPS.
White paper
A report that describes how a technology or product solves a problem. It’s a marketing and technical document that doesn’t go too far in either direction.
Example: An organization creates a new solution for poor cell phone reception. That organization would release a white paper to advertise the technology’s effectiveness and describe how it works.
Whitelist
A list of trusted email adresses, domains and/or internet adresses that are permitted to pass through a system or filter.
Use: During a sales call with a prospect it’s often necessary to have the prospect add the rep’s email adress to their whitelist so the spam filter doesn’t block the test email.
Phishing
The process of attempting to acquire sensitive information such as usernames, passwords and bulk credit card details. It’s done by masquerading as a trustworthy entity on bulk email which tries to evade spam filters. Email claiming to be from popular social websites, banks, auction sites or IT administrators are commonly used to lure the unsuspecting public.
It’s a form of criminally fraudulent social engineering.
Example: cyber criminals put together and send an email that looks like it comes from Chase Bank saying you need to pay your credit card. This is phishing because it’s an attempt by the bad guys to get you to click on something or fill out something that gives them your information - in this case your banking information.
Phishing is the major tool used by the bad guys to get users to click on something and lead them to confidential information like usernames, passwords, social security numbers, names etc. It’s not the only way to get the information but it’s one of the main ways.
Spear phishing
A small focused targeted phishing attack on a specific person or organization with the goal to penetrate their defences. The attack is done after research has been done on the target and has a specific personalized component designed to make the target do something against his or her own interest.
Phishing attack surface
The quantity of emails exposed on the internet. The more email adresses exposed the bigger the attack footprint is and the higher the risk for phishing attacks.
Phish-prone percentage
A term coined by KnowBe4 that indicates the percentage of employees that are prone to click on phishing links
The customer starts with a baseline percentage which is the percentage of users who click on phishing links before being trained. Once trained the test is done again 12 months later to see the improvement.
Social engineering
The act of manipulating people into performing actions or divulging confidential information.
The term typically applies to trickery or deception for the purpose of information gathering, fraud or computer system access.
Phishing and spear phishing are forms of social engineering. The user is tricked into opening an email and clicking on links that open a way into the computer. This allows the bad guy to enter the user’s computer and computer network. The bad guys end up taking out valuable and confidential content like names, adresses, phone numbers, social security numbers, usernames and passwords.