IT Glossary - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Cross-Origin Resource Policy (CORP)

A security feature that allows web developers to control how resources on their web server can be requested from another origin. CORP is part of a suite of complementary security features, like Cross-Origin Resource Sharing (CORS) and Cross-Origin Embedder Policy (COEP), designed to enhance web application security by preventing certain types of cross-origin attacks.

You will find this term commonly used in Web Development, Security

Cross-Origin Resource Sharing (CORS) Policy

A mechanism that allows or restricts requested resources on a web page from another domain outside the domain from which the first resource was served. A CORS policy is a security feature that enables web developers to control which cross-origin requests are allowed, enhancing the security of web applications by preventing unwanted interactions.

You will find this term commonly used in Security, Web Development

Cross-Platform Compatibility

The ability of software, applications, or services to operate on different operating systems or platforms without requiring modification. Cross-platform compatibility is significant for developers who want to reach a broader audience by ensuring their applications can run on various devices and systems.

You will find this term commonly used in Software Development

Cross-Platform Compatibility Testing

The process of verifying that software applications or systems operate consistently and correctly across multiple platform environments, such as different operating systems, devices, or web browsers. Compatibility testing ensures that applications provide a uniform user experience regardless of the underlying platform.

You will find this term commonly used in Software Development, Quality Assurance

Cross-Platform Development

The practice of developing software applications that are compatible with multiple operating systems or platforms (e.g., Windows, macOS, Linux, iOS, Android). This approach enables developers to write code once and deploy it across various platforms, increasing the application's reach and reducing development time and costs.

You will find this term commonly used in Software Development

Cross-Platform Development Tools

Tools and frameworks that enable developers to create applications that run across multiple operating systems and platforms (e.g., Windows, macOS, Linux, iOS, Android) from a single codebase. These tools simplify the development process by reducing the need for platform-specific code, facilitating broader application reach and efficiency.

You will find this term commonly used in Software Development, Cross-Platform

Cross-Platform Mobile Development

The development of mobile applications that are compatible with multiple mobile operating systems, such as iOS and Android, from a single codebase. This approach enables developers to reach a wider audience while reducing development time and costs.

You will find this term commonly used in Software Development

Cross-Platform Software

Software designed to work on multiple computing platforms or operating systems with little or no modification. This enables developers to reach a wider audience by making their applications accessible on different devices and platforms.

You will find this term commonly used in Software Development

Cross-Site Request Forgery (CSRF)

A web security vulnerability that allows an attacker to induce users to perform actions that they do not intend to perform. It allows an attacker to partially bypass the same-origin policy, which is designed to prevent different websites from interfering with each other.

You will find this term commonly used in Security, Web Development

Cross-Site Scripting (XSS)

A security vulnerability typically found in web applications. XSS enables attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy.

You will find this term commonly used in Security, Web Development

Cross-Site Scripting (XSS) Prevention

The implementation of security measures to protect web applications from XSS attacks, where attackers inject malicious scripts into web pages viewed by other users. Prevention techniques include validating and sanitizing user input, using HTTP headers to restrict script execution, and employing Content Security Policy (CSP) to control resources the browser is allowed to load.

You will find this term commonly used in Web Development, Security

Cryptanalysis Techniques

The methods used to study cryptographic security systems with the aim of understanding how they work and finding vulnerabilities. Techniques include frequency analysis, differential cryptanalysis, and side-channel attacks, among others. Cryptanalysis is essential for evaluating the security of cryptographic algorithms.

You will find this term commonly used in Security, Cybersecurity

Cryptocurrency

A digital or virtual currency that uses cryptography for security, making it difficult to counterfeit. Cryptocurrencies leverage blockchain technology to gain decentralization, transparency, and immutability. The most famous example, Bitcoin, has paved the way for hundreds of others, each with its own functionalities and specifications.

You will find this term commonly used in Finance, Security

Cryptocurrency Exchange

A platform where individuals can buy, sell, or exchange cryptocurrencies for other digital currency or traditional currency like US dollars or Euro. These platforms play a crucial role in the cryptocurrency ecosystem by providing liquidity and enabling users to convert between different forms of value.

You will find this term commonly used in Blockchain, Finance

Cryptocurrency Governance

The mechanisms, policies, and standards established to manage and regulate the operations, transactions, and development of a cryptocurrency network. Governance in the cryptocurrency context includes decision-making processes regarding updates to the network protocol, token economics, and dispute resolution among stakeholders.

You will find this term commonly used in Blockchain, Cryptocurrency

Cryptocurrency Mining

The process by which transactions for various forms of cryptocurrency are verified and added to the blockchain digital ledger. Also known as crypto mining, this process involves compiling recent transactions into blocks and trying to solve a computationally difficult puzzle. The participant who first solves the puzzle gets to place the next block on the blockchain and claim the rewards.

You will find this term commonly used in Blockchain, Security

Cryptocurrency Mining Algorithms

Specific algorithms used in the process of validating transactions and creating new coins within a blockchain network. These algorithms solve complex mathematical problems to secure the network and verify transactions, with miners being rewarded with cryptocurrency for their efforts. Different cryptocurrencies use various algorithms, such as Proof of Work (PoW) and Proof of Stake (PoS).

You will find this term commonly used in Blockchain, Cryptocurrency

Cryptocurrency Regulation

The set of laws, guidelines, and policies established by governmental and financial authorities to govern the creation, distribution, and exchange of cryptocurrencies and blockchain technology. Regulation aims to prevent illegal activities, protect investors, and ensure the stability of the financial system while fostering innovation and growth within the cryptocurrency market.

You will find this term commonly used in Blockchain, Legal

Cryptocurrency Tax Compliance

The adherence to tax laws and regulations related to the reporting and taxation of cryptocurrency transactions. Tax compliance for cryptocurrency involves understanding the tax implications of trading, mining, and using cryptocurrencies for payments, as well as accurately reporting gains, losses, and income on tax returns.

You will find this term commonly used in Cryptocurrency, Legal

Cryptocurrency Wallet

A digital wallet that enables users to store, send, and receive cryptocurrencies. Unlike a physical wallet, a cryptocurrency wallet doesn't actually store currency but rather stores the cryptographic information needed to access and transact with the digital currency held on a blockchain.

You will find this term commonly used in Blockchain, Security

Cryptocurrency Wallet Security

Measures and technologies used to protect cryptocurrency wallets from unauthorized access and theft. This includes both physical hardware wallets and software wallets, emphasizing the importance of encryption, multi-factor authentication, and safe storage practices.

You will find this term commonly used in Blockchain, Security

Cryptoeconomics

An interdisciplinary field combining cryptography with economic theories and models to design secure and efficient decentralized networks and applications, such as cryptocurrencies and blockchain systems. Cryptoeconomics employs economic incentives, game theory, and cryptographic techniques to regulate network behavior and ensure network security.

You will find this term commonly used in Blockchain, Economics

Cryptographic Assurance

The confidence that cryptographic systems and protocols are secure and function as intended. Assurance can be achieved through rigorous testing, formal verification, and compliance with established cryptographic standards and best practices.

You will find this term commonly used in Security, Cryptography

Cryptographic Hash Function

A function used in cryptography to convert data of any size into a fixed-size string of bytes. The output, known as the hash, is designed to uniquely represent the input data. Hash functions are a foundational component in various cryptographic operations, including digital signatures and data integrity verification.

You will find this term commonly used in Security, Cybersecurity

Cryptographic Key Exchange Protocols

Protocols designed to securely exchange cryptographic keys between parties over an insecure communication channel. These protocols ensure that keys can be shared without interception or compromise, enabling secure communication.

You will find this term commonly used in Security, Networking

Cryptographic Key Management

The process of managing cryptographic keys in a cryptosystem, which includes the generation, exchange, storage, use, destruction, and replacement of keys. Effective key management is crucial for maintaining the security of encrypted data and communications.

You will find this term commonly used in Security, Cybersecurity

Cryptographic Key Rotation Policy

A security policy that specifies how and when cryptographic keys should be changed or rotated to maintain the security of encrypted data. Key rotation helps protect against long-term attacks and reduces the risks associated with key compromise or theft.

You will find this term commonly used in Security, Cryptography

Cryptographic Protocol

A formal set of rules that dictates how entities communicate securely across a network. Cryptographic protocols involve procedures for cryptographic key generation, distribution, and exchange; data encryption and decryption; and authentication and integrity checks. They are essential for ensuring secure online communication and data protection.

You will find this term commonly used in Security, Networking

Cryptography

The science of securing communication and data through the use of codes so that only those for whom the information is intended can read and process it. Cryptography is vital for protecting information in computer systems and across the Internet, including financial transactions and confidential communication.

You will find this term commonly used in Security, Cybersecurity

Cryptography Algorithms

Mathematical formulas or protocols used in encrypting and decrypting data. Cryptography algorithms are the basis for ensuring confidentiality, integrity, and authentication in the transmission of digital information. Common types include symmetric-key algorithms (e.g., AES) and asymmetric-key algorithms (e.g., RSA).

You will find this term commonly used in Security, Cybersecurity

Cryptography Key Lifecycle Management

The comprehensive process of managing cryptographic keys from creation to disposal. It includes key generation, distribution, storage, usage, rotation, and destruction. Effective key lifecycle management is crucial for maintaining the security of encrypted data and ensuring that old or compromised keys do not lead to security vulnerabilities.

You will find this term commonly used in Security, Cybersecurity

Cryptography Policy

A set of guidelines and standards that govern the use of cryptographic methods and tools within an organization. A cryptography policy covers aspects such as key management, encryption protocols, and compliance requirements to ensure the secure and effective use of cryptography to protect sensitive information.

You will find this term commonly used in Security, Information Technology

CSS (Cascading Style Sheets)

A style sheet language used for describing the presentation of a document written in a markup language like HTML. CSS is a cornerstone technology of the World Wide Web, alongside HTML and JavaScript, enabling web developers to separate the content and design, improving accessibility and providing more flexibility and control in the specification of presentation characteristics.

You will find this term commonly used in Web Development

Customer Experience Management (CEM or CXM)

The practice of designing and reacting to customer interactions to meet or exceed customer expectations, thereby increasing customer satisfaction, loyalty, and advocacy. It involves understanding customer needs through their interactions with the company and using that insight to enhance the products and services offered.

You will find this term commonly used in Business, IT Management

Customer Identity and Access Management (CIAM)

A subset of identity and access management (IAM) focused on managing and securing customer identities and data. CIAM solutions provide features like registration, authentication, profile management, and data governance to enhance the customer experience while ensuring data privacy and compliance.

You will find this term commonly used in Security, Business

Cyber Attack

An attempt by hackers to damage or destroy a computer network or system. Cyber attacks can be launched from anywhere in the world, and can target anything from personal computers to entire networks or infrastructures, and can involve the theft of data, the disruption of services, or the compromise of security systems.

You will find this term commonly used in Security, Cybersecurity

Cyber Attack Attribution

The process of identifying the source or perpetrator behind a cyber attack. Attribution involves analyzing attack methods, infrastructure, and other digital evidence to determine the responsible party, which can be challenging due to the anonymity and complexity of cyber operations.

You will find this term commonly used in Security, Cybersecurity

Cyber Attack Simulation

A practice in which an organization simulates a cyber attack on its own network to assess the readiness of its defenses and to identify vulnerabilities. Simulations help in training IT security teams, testing the effectiveness of security measures, and improving incident response capabilities.

You will find this term commonly used in Security, Cybersecurity

Cyber Attack Simulations and War Gaming

Exercises designed to mimic the actions of adversaries in cyber attacks to test an organization's preparedness, response capabilities, and resilience. These simulations help identify vulnerabilities, assess the effectiveness of security measures, and train staff in incident response.

You will find this term commonly used in Security, Cybersecurity

Cyber Attack Trend Analysis

The study and interpretation of patterns in cyber attacks to predict future cybersecurity threats and vulnerabilities. Trend analysis helps organizations prepare for and mitigate the impact of potential cyber incidents.

You will find this term commonly used in Security, Cybersecurity

Cyber Espionage

The practice of using cyber techniques to conduct espionage or spying activities to gather confidential information without the permission or knowledge of the holder of the information. It's often state-sponsored and targets government data, intellectual property, and sensitive corporate data.

You will find this term commonly used in Security, Cybersecurity

Cyber Forensics and Incident Analysis

The discipline of investigating cybersecurity incidents and breaches to uncover the cause, extent, and perpetrators of an attack. Cyber forensics involves the collection, preservation, analysis, and presentation of digital evidence to support response activities and legal proceedings, helping organizations understand attack vectors and strengthen their defenses.

You will find this term commonly used in Cybersecurity, Forensics

Cyber Incident Reporting System

A framework or platform for reporting cybersecurity incidents within an organization. Such systems facilitate timely sharing of information about potential security breaches, enabling quicker response and mitigation efforts.

You will find this term commonly used in Security, IT Management

Cyber Incident Response Coordination

The organized approach to managing and responding to cybersecurity incidents, involving the coordination of teams, tools, and procedures to quickly mitigate damage, analyze breaches, and restore services. Effective coordination ensures a unified and efficient response to incidents, minimizing impact and recovery time.

You will find this term commonly used in Cybersecurity, Incident Management

Cyber Incident Response Team (CIRT)

A group within an organization that is responsible for addressing and managing the aftermath of a security breach or cyber attack. The CIRT's responsibilities include investigating the incident, containing the damage, eradicating the cause, recovering systems to normal operation, and communicating with stakeholders throughout the process.

You will find this term commonly used in Security, Cybersecurity

Cyber Insurance

A type of insurance product designed to protect businesses and individual users from Internet-based risks, and more generally from risks relating to information technology infrastructure and activities. Coverage typically includes protection from data breaches, cyber attacks, and other digital security incidents.

You will find this term commonly used in Business, Security

Cyber Insurance Policy Analysis

The examination and evaluation of cyber insurance policies to understand coverage, exclusions, and obligations. Policy analysis helps organizations assess their insurance needs, understand the risks covered, and ensure that their cybersecurity practices align with policy requirements for optimal protection against cyber incidents.

You will find this term commonly used in Business, Security

Cyber Range Training

An interactive, simulated cybersecurity environment used for training and testing cybersecurity skills in a realistic but controlled setting. Cyber ranges allow individuals and teams to practice responding to cyber threats and attacks, enhancing their ability to detect, mitigate, and recover from real-world cybersecurity challenges.

You will find this term commonly used in Cybersecurity, Education

Cyber Resilience

The ability of an organization to prepare for, respond to, and recover from cyberattacks. It combines elements of cybersecurity and business continuity to ensure that an organization can withstand and quickly bounce back from incidents that disrupt its operations, integrity, or reputation.

You will find this term commonly used in Security, Business Continuity

Cyber Resilience Planning

The development of strategies and practices that enable an organization to withstand and quickly recover from cyber incidents. Cyber resilience planning involves preparing for, responding to, and recovering from cyberattacks in a way that minimizes impact and maintains business continuity.

You will find this term commonly used in Security, Business Continuity

What's Your
Career Path?
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
111 Hrs 24 Min
icons8-video-camera-58
518 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Cisco Network Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 56 Min
icons8-video-camera-58
473 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Administrator Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
162 Hrs 25 Min
icons8-video-camera-58
524 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AZ-104 Learning Path : Become an Azure Administrator

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
109 Hrs 6 Min
icons8-video-camera-58
433 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Certified Ethical Hacker Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 51 Min
icons8-video-camera-58
807 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Web Designer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
34 Hrs 37 Min
icons8-video-camera-58
172 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Comprehensive IT User Support Specialist Training: Accelerate Your Career

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
128 Hrs 51 Min
icons8-video-camera-58
621 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Black Friday

70% off

Our Most popular LIFETIME All-Access Pass