IT Glossary - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Kerberos Protocol

A network authentication protocol designed to provide strong authentication for client/server applications using secret-key cryptography, even over non-secure network channels.

You will find this term commonly used in Network Security, Authentication

Kerberos Ticket

A ticket-granting ticket (TGT) used in the Kerberos protocol to authenticate a user to a network service, proving the user's identity without sending the password across the network.

You will find this term commonly used in Security, Authentication

Kerberos Ticket Granting Ticket (TGT)

A ticket used in the Kerberos protocol to obtain other tickets for specific services within a network, part of the mechanism that allows for secure, passwordless authentication to multiple services.

You will find this term commonly used in Security, Authentication

Kerckhoffs's Principle

A concept in cryptography stating that a cryptographic system should be secure even if everything about the system, except the key, is public knowledge.

You will find this term commonly used in Cryptography, Security

Kerfuffle

Informal term used to describe a commotion or fuss, especially one caused by conflicting views, often used in the context of debates on technology implementation or software updates.

You will find this term commonly used in Workplace Culture, Communication

Kernel

The core component of an operating system that manages system resources and the communication between hardware and software applications.

You will find this term commonly used in General IT, Operating Systems

Kernel Address Space

The range of memory addresses that the kernel of an operating system can use to run its code and manage the system, separate from the user space where application programs run.

You will find this term commonly used in Operating Systems, Memory Management

Kernel Compilation

The process of compiling the kernel source code into a binary format that the computer can execute, allowing for customization of the operating system.

You will find this term commonly used in Operating Systems, Development

Kernel Compilation Flags

Options and settings used during the compilation of the kernel to enable or disable features, optimize performance, or configure the kernel to better suit specific hardware or requirements.

You will find this term commonly used in Operating Systems, Development

Kernel Configuration

The process of setting up kernel parameters and compiling the kernel to suit a specific system's requirements, often for optimizing performance or enabling specific hardware support.

You will find this term commonly used in Operating Systems, Development

Kernel Configuration Tool

A utility that allows users to configure the options for the operating system kernel, enabling or disabling specific features based on the system's needs and the security requirements.

You will find this term commonly used in Operating Systems, System Administration

Kernel Debugging

The process of diagnosing and fixing issues within the operating system kernel, often requiring specialized tools and knowledge of low-level system operations.

You will find this term commonly used in Software Development, Operating Systems

Kernel Hardening

The process of enhancing the security of the kernel by reducing its attack surface through various techniques such as removing unnecessary code, applying security patches, and configuring security settings.

You will find this term commonly used in Operating Systems, Cybersecurity

Kernel Mode

A mode of operation in an operating system that grants the software running in this mode full access to all hardware resources and system memory.

You will find this term commonly used in Operating Systems, Security

Kernel Mode Drivers

Drivers that run with high-level privileges in the operating system's kernel mode, allowing them to execute tasks with direct access to the hardware and system memory.

You will find this term commonly used in Operating Systems, Hardware

Kernel Mode Execution

A mode in which the system's kernel operates, having full access to all hardware and system resources, as opposed to user mode, where applications are restricted in their access to resources.

You will find this term commonly used in Operating Systems, Security

Kernel Module

A piece of code that can be loaded into the kernel of an operating system to extend its capabilities without needing to reboot the system.

You will find this term commonly used in Operating Systems, Security

Kernel Object

In operating systems, an object managed by the kernel that represents a resource or a service, such as a file, a process, or a thread, providing a way to manage access and permissions.

You will find this term commonly used in Operating Systems, Resource Management

Kernel Panic

A safety measure taken by an operating system's kernel when it detects an internal fatal error from which it cannot safely recover. The system halts, requiring a restart.

You will find this term commonly used in Operating Systems, Security

Kernel Patch

An update to the kernel of an operating system, often for security improvements, bug fixes, or performance enhancements.

You will find this term commonly used in Operating Systems, Security

Kernel Patching

The process of applying updates to the kernel of an operating system to fix vulnerabilities, improve performance, or add new features, requiring careful testing to ensure system stability.

You will find this term commonly used in Operating Systems, Security

Kernel Series

Versions or releases of the kernel of an operating system, each with specific features, improvements, and bug fixes.

You will find this term commonly used in Operating Systems, Development

Kernel Space

The memory space in which the kernel (the core of the operating system) operates and has full access to the hardware, distinct from user space, where application software runs.

You will find this term commonly used in Operating Systems, Security

Kernel Space Driver

A driver that operates in kernel space, having full access to the hardware and system resources of the computer, used for high-performance and critical device operations.

You will find this term commonly used in Operating Systems, Hardware

Kernel Synchronization

Techniques and mechanisms used to coordinate actions and access to resources in an operating system kernel, ensuring data consistency and preventing race conditions.

You will find this term commonly used in Operating Systems, Concurrency

Kernel Thread

A type of thread in operating systems that operates in kernel mode and has the ability to execute kernel code and access system memory directly, used for tasks that require performing low-level operations close to the hardware.

You will find this term commonly used in Operating Systems, Multitasking

Kernel Transaction Manager

A component of some operating systems that enables the creation, management, and coordination of transactions for kernel mode resources, facilitating the development of reliable and consistent system services.

You will find this term commonly used in Operating Systems, Data Management

Kernel Update

The process of upgrading the kernel in an operating system to a newer version, which can include security patches, bug fixes, and performance enhancements.

You will find this term commonly used in Operating Systems, Maintenance

Kernel Upgrade

The process of updating the kernel of an operating system to a newer version, which may include improvements in security, performance, and support for new hardware.

You will find this term commonly used in Operating Systems, Maintenance

Kernel-based Virtual Machine (KVM)

A virtualization module in the Linux kernel that allows the kernel to function as a hypervisor, enabling the running of multiple virtual machines (VMs) with unmodified Linux or Windows images.

You will find this term commonly used in Virtualization, Cloud Computing

Kernel-Level Thread

Threads that are managed directly by the operating system kernel, offering high performance and full system resource access but requiring careful management to avoid conflicts and ensure security.

You will find this term commonly used in Operating Systems, Multithreading

Key Agreement

A protocol or algorithm by which two or more parties establish a shared key over an insecure medium without transferring the key itself, used for securing communication.

You will find this term commonly used in Cryptography, Network Security

Key Agreement Protocol

A protocol used in cryptography for two or more parties to agree on a key in such a way that both influence the outcome, used to establish a shared secret over an insecure medium without the need to exchange the key itself.

You will find this term commonly used in Security, Cryptography

Key Agreement Scheme

A cryptographic protocol that allows two or more parties to agree on a key in such a way that both influence the result, ensuring secure communication over an insecure channel.

You will find this term commonly used in Cryptography, Security

Key Dependency

In database management, a concept where the value of one attribute depends on the value of another key attribute, used in the normalization process.

You will find this term commonly used in Databases, Data Modeling

Key Derivation Functions (KDF)

Cryptographic functions that derive one or more secret keys from a secret value, such as a password or passphrase, using a hashing, encryption, or pseudorandom function process.

You will find this term commonly used in Cryptography, Security

Key Distribution Center (KDC)

A part of the Kerberos network authentication protocol responsible for issuing tickets for secure communication between clients and services within a network.

You will find this term commonly used in Security, Network Authentication

Key Distribution Protocol

A protocol used to securely distribute cryptographic keys to parties who wish to communicate securely, ensuring that keys are exchanged in a manner that prevents interception or compromise.

You will find this term commonly used in Cryptography, Network Security

Key Escrow

A security arrangement in which cryptographic keys are held in escrow by a third party, so that under certain circumstances (such as a court order), encrypted data can be decrypted without the consent of the data owner.

You will find this term commonly used in Security, Cryptography

Key Escrow Agreement

A legal agreement for placing a cryptographic key with a third party (escrow agent), so it can be released under agreed conditions, often used in law enforcement or corporate governance.

You will find this term commonly used in Cryptography, Legal

Key Escrow Service

A third-party service that holds cryptographic keys in escrow to facilitate key recovery or lawful access to encrypted data under certain conditions.

You will find this term commonly used in Cryptography, Legal

Key Escrow Systems

Systems designed to securely store cryptographic keys with a trusted third party, allowing authorized parties to access the keys under predefined conditions.

You will find this term commonly used in Cryptography, Security

Key Exchange

A method in cryptography by which cryptographic keys are exchanged between two parties, allowing use of a cryptographic algorithm.

You will find this term commonly used in Security, Cryptography

Key Exchange Algorithm

An algorithm that determines how cryptographic keys are exchanged between parties, ensuring secure communication over an insecure channel.

You will find this term commonly used in Security, Cryptography

Key Exchange Mechanism

A method used in cryptography to safely exchange cryptographic keys between parties, ensuring that a shared secret can be established securely over an insecure channel.

You will find this term commonly used in Cryptography, Network Security

Key Fob

A small security hardware device with built-in authentication used to control and secure access to network services and data, often carrying a digital signature or other secure means of identity verification.

You will find this term commonly used in Security, Access Control

Key Generation

The process of generating keys for encryption or decryption in cryptographic algorithms, crucial for secure communication in networks and systems.

You will find this term commonly used in Security, Cryptography

Key Generation Algorithm

An algorithm used to generate cryptographic keys that are both unpredictable and unique, ensuring the security of digital communications and data.

You will find this term commonly used in Cryptography, Security

Key Length

The size of a key (usually in bits) used in a cryptographic algorithm, indicating the algorithm's strength, with longer keys providing a higher level of security.

You will find this term commonly used in Cryptography, Security

Key Management

The process of managing cryptographic keys in a cryptosystem, which includes the generation, exchange, storage, use, and replacement of keys.

You will find this term commonly used in Security, Cryptography

What's Your
Career Path?
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
174 Hrs 15 Min
icons8-video-camera-58
773 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
12 Hrs 18 Min
icons8-video-camera-58
207 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
111 Hrs 24 Min
icons8-video-camera-58
518 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
58 Hrs 1 Min
icons8-video-camera-58
225 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Leadership Mastery: The Executive Information Security Manager

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
95 Hrs 34 Min
icons8-video-camera-58
348 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Cisco Network Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 56 Min
icons8-video-camera-58
473 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Administrator Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
162 Hrs 25 Min
icons8-video-camera-58
524 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Black Friday

70% off

Our Most popular LIFETIME All-Access Pass