Skip to content

IT Dictionary

Every term explained twice: once in plain English, once at production depth. Start with what you know, go as deep as you need.

C
Caching
general

Storing frequently accessed data in a fast, temporary location so future requests can be served without repeating the original expensive operation.

Read definition →
Certificate AuthorityCA
cybersecurity

A trusted entity that issues and signs digital certificates, cryptographically vouching that a public key belongs to a specific identity. The foundation of PKI trust chains.

Read definition →
Checksum
cybersecurity

A fixed-length string produced by running a file through a hash function, used to verify the file has not been corrupted or modified.

Read definition →
CI/CDCI/CD
general

The practice of automatically building, testing, and deploying code changes whenever developers push updates, catching bugs early and shipping faster.

Read definition →
Cloud Computing
cloud

The delivery of computing resources (servers, storage, databases, networking) over the internet on a pay-as-you-go basis instead of owning physical hardware.

Read definition →
Container
linux

A lightweight, portable package that bundles an application with its dependencies and runs in an isolated process on the host OS, sharing the kernel.

Read definition →
Content Delivery NetworkCDN
cloud

A globally distributed network of servers that caches and delivers content from the location closest to each user, reducing latency and origin load.

Read definition →
Context Window
general

The maximum amount of text (measured in tokens) that a language model can read and consider at once when generating a response.

Read definition →
CORSCORS
cybersecurity

A browser security mechanism that controls which websites can make requests to your API, preventing unauthorized cross-origin data access.

Read definition →
Cron Job
linux

A scheduled task on a Linux system that runs automatically at specified times or intervals, used for backups, maintenance scripts, and recurring automation.

Read definition →
Cross-Site Request ForgeryCSRF
cybersecurity

An attack that tricks a victim's browser into submitting an authenticated request to a target site without the user's knowledge or intent.

Read definition →
Cross-Site ScriptingXSS
cybersecurity

An attack that injects malicious JavaScript into a web page viewed by other users, allowing session theft, defacement, or redirection.

Read definition →
CVECVE
cybersecurity

A standardized identifier for publicly known cybersecurity vulnerabilities, enabling organizations to track and prioritize security patches.

Read definition →
P
Packet
networking

A small unit of data transmitted over a network, containing both the payload (actual data) and headers with routing information.

Read definition →
Penetration Testing
cybersecurity

An authorized simulated cyberattack against a system to identify vulnerabilities before real attackers do, performed by security professionals.

Read definition →
Phishing
cybersecurity

A social engineering attack that uses fraudulent emails, messages, or websites to trick people into revealing passwords, financial information, or installing malware.

Read definition →
PingPING
networking

A tool that checks whether another device on a network is reachable and how long the round trip takes.

Read definition →
PIVPIV
cybersecurity

Personal Identity Verification - a US government standard (FIPS 201) for smart card authentication. Defines a set of key slots on a chip for different cryptographic purposes: login, signing, and encryption.

Read definition →
PKCS#11PKCS#11
cybersecurity

A standard C API (also called Cryptoki) for interacting with hardware cryptographic devices like smart cards and HSMs. OpenSC implements PKCS#11 for YubiKeys, allowing SSH, browsers, and other applications to use hardware-backed keys.

Read definition →
PKIPKI
cybersecurity

Public Key Infrastructure - the complete system of policies, roles, hardware, software, and procedures needed to create, manage, distribute, and revoke digital certificates and manage public-key encryption.

Read definition →
Port
networking

A numbered endpoint on a device that identifies a specific application or service, allowing multiple network services to run on the same IP address.

Read definition →
Privilege Escalation
cybersecurity

An attack where an adversary gains higher access permissions than originally granted, escalating from a normal user to administrator or root.

Read definition →
Prompt Engineering
general

The practice of designing and refining inputs to AI language models to get more accurate, useful, and consistent outputs.

Read definition →
S
SIEMSIEM
cybersecurity

A platform that collects, correlates, and analyzes log data from across your infrastructure to detect security threats and support incident investigation.

Read definition →
Single Sign-OnSSO
cybersecurity

An authentication scheme that lets users log in once and gain access to multiple independent systems without re-entering credentials for each one.

Read definition →
SNMPSNMP
networking

A protocol for collecting and organizing information about managed network devices, enabling centralized monitoring of routers, switches, and servers.

Read definition →
SQL InjectionSQLi
cybersecurity

An attack that inserts malicious SQL code into application inputs to manipulate or extract data from a database.

Read definition →
SSHSSH
cybersecurity

A cryptographic protocol for secure remote login, command execution, and file transfer over an unsecured network.

Read definition →
SSL/TLSTLS
networking

The encryption protocols that secure data in transit between a client and server, powering HTTPS and most encrypted internet communication.

Read definition →
Subnet Mask
networking

A number that tells a device which part of an IP address identifies the network and which part identifies the specific device.

Read definition →
Supply Chain Attack
cybersecurity

An attack that compromises a trusted software vendor, library, or update mechanism to distribute malicious code to all downstream users.

Read definition →
systemd
linux

The init system and service manager for most modern Linux distributions, responsible for booting the system and managing running services.

Read definition →