IT Glossary
Key Terms To Know In The IT Industry
IP Forwarding
The process of sending an Internet Protocol (IP) packet from one network to another, typically performed by routers to direct traffic across the internet or within networks.
You will find this term commonly used in Networking
IP Geolocation
The identification of the geographic location of an IP address in the real world, often used for analytics, content localization, and security purposes.
You will find this term commonly used in Networking, Security
IP Leasing
The allocation of IP addresses for a fixed period of time, after which the IP address is returned to a pool for reassignment. Common in DHCP (Dynamic Host Configuration Protocol) environments.
You will find this term commonly used in Networking
IP Multicast
A method for sending Internet Protocol (IP) datagrams to a group of interested receivers in a single transmission.
You will find this term commonly used in Networking
IP Multicasting
A method of sending internet traffic to multiple recipients simultaneously, used in streaming video and other applications that require real-time broadcasting to multiple locations.
You will find this term commonly used in Networking
IP Spoofing
A technique used by cyber attackers to disguise incoming traffic as coming from a trusted source by forging the IP address. This is often used in denial-of-service attacks.
You will find this term commonly used in Networking, Security
IP Telephony
The use of Internet Protocol's packet-switched connections to exchange voice, fax, and other forms of information traditionally carried over the public switched telephone network (PSTN).
You will find this term commonly used in Networking, Telecommunications
IPL (Initial Program Load)
The process of loading the operating system into the computer's main memory at startup.
You will find this term commonly used in Operating Systems, Hardware
IPS (Intrusion Prevention System)
A network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits.
You will find this term commonly used in Security, Cybersecurity
IPsec (Internet Protocol Security)
A protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session.
You will find this term commonly used in Networking, Security
IPSec VPN Configurations
Configurations of IP Security (IPSec) virtual private networks (VPNs), providing secure internet protocol communications by authenticating and encrypting each IP packet in a data stream.
You will find this term commonly used in Networking, Security
IPT (Intellectual Property Theft)
The act of stealing or using without permission the intellectual property of another individual or company, including patents, copyrights, trademarks, and trade secrets.
You will find this term commonly used in Security, Cybersecurity
IPTC Information Interchange Model
A standard for exchanging metadata and other information between news organizations, covering a wide range of content types including text, images, and video.
You will find this term commonly used in Data Management, Media
IPTV (Internet Protocol Television)
A system through which television services are delivered using the Internet protocol suite over a packet-switched network such as a LAN or the Internet, instead of being delivered through traditional terrestrial, satellite signal, and cable television formats.
You will find this term commonly used in Digital Media, Networking
IPv4
The fourth version of the Internet Protocol, which assigns a unique address to devices on a network for identification and location addressing.
You will find this term commonly used in Networking
IPv4 Address Exhaustion
The depletion of the available IPv4 address space due to the expansion of the internet, leading to the adoption of IPv6 for a larger address space.
You will find this term commonly used in Networking
IPv4 Fragmentation
The process of breaking down an IPv4 packet into smaller packets when the size of the packet exceeds the maximum transmission unit (MTU) of the route to its destination.
You will find this term commonly used in Networking
IPv4 to IPv6 Transition Technologies
Technologies and strategies used to facilitate the transition from IPv4 to IPv6, addressing the depletion of IPv4 addresses and supporting dual-stack networking.
You will find this term commonly used in Networking
IPv6
The most recent version of the Internet Protocol, designed to replace IPv4, offering an almost unlimited number of IP addresses.
You will find this term commonly used in Networking
IPv6 Address Allocation
The distribution of internet addresses using the IPv6 protocol, which provides a significantly larger pool of addresses compared to IPv4, to accommodate the growing number of devices on the internet.
You will find this term commonly used in Networking
IPv6 Adoption
The process of transitioning from IPv4 to IPv6, involving the update and configuration of network infrastructure to support the newer protocol, addressing the need for a larger address space.
You will find this term commonly used in Networking
IPv6 Leak
The inadvertent leaking of internet traffic over an IPv4 connection while connected to an IPv6 network, often a security concern as it may bypass VPN security.
You will find this term commonly used in Networking, Security
IPv6 Prefix Delegation
A mechanism that allows internet service providers to dynamically assign portions of their IPv6 address space to customers, simplifying address distribution and management.
You will find this term commonly used in Networking
IPv6 Transition Mechanisms
Techniques that allow for the coexistence of IPv4 and IPv6 networks and facilitate the transition to IPv6. Examples include dual-stack, tunneling, and translation methods.
You will find this term commonly used in Networking
IR (Incident Response) Plan
A set of policies and procedures for identifying, investigating, and responding to potential cybersecurity incidents.
You will find this term commonly used in Security, Cybersecurity
IRC (Internet Relay Chat)
An application layer protocol that facilitates communication in the form of text. The chat process works on a client/server networking model.
You will find this term commonly used in Networking, General IT
IRC Bots
Automated programs that run on Internet Relay Chat (IRC) networks to provide services, information, or to control spam, often used for both legitimate and malicious purposes.
You will find this term commonly used in Networking, Security
IRQ (Interrupt Request)
A hardware signal sent to the processor that temporarily stops a running program and allows a special program, an interrupt handler, to run instead.
You will find this term commonly used in Hardware, Operating Systems
ISA (Instruction Set Architecture)
The part of the computer architecture related to programming, including the native data types, instructions, registers, addressing modes, memory architecture, interrupt and exception handling, and external IO.
You will find this term commonly used in General IT, Development
ISACA (Information Systems Audit and Control Association)
Provides certifications for information systems auditing, governance, risk management, and information security management, including CISA, CRISC, CISM, and CGEIT.
You will find this term commonly used in IT Governance, Risk Management, Information Security
ISAPI (Internet Server Application Programming Interface)
A set of Windows program calls that let you write Web server applications that will run faster than CGI programs, specific to Microsoft's IIS server.
You will find this term commonly used in Web Development
iSCSI (Internet Small Computer Systems Interface)
An IP-based storage networking standard for linking data storage facilities. It provides block-level access to storage devices by carrying SCSI commands over a TCP/IP network.
You will find this term commonly used in Networking, Storage
ISDN (Integrated Services Digital Network)
An international communications standard for sending voice, video, and data over digital telephone lines or normal telephone wires. It was widely used before the emergence of broadband internet.
You will find this term commonly used in Networking
ISDN Adapter
A device that enables the connection of computers to an Integrated Services Digital Network (ISDN) for digital transmission of voice and data over ordinary telephone copper wires.
You will find this term commonly used in Networking, Telecommunications
ISDN Terminal Adapter
A device used to connect ISDN lines to computers or other digital devices, converting digital signals to suit the ISDN network for data transmission.
You will find this term commonly used in Networking, Hardware
ISMS (Information Security Management System)
A systematic approach to managing sensitive company information so that it remains secure. It includes people, processes, and IT systems by applying a risk management process.
You will find this term commonly used in Security, Cybersecurity
ISO (International Organization for Standardization)
An independent, non-governmental international organization that develops standards to ensure the quality, safety, and efficiency of products, services, and systems.
You will find this term commonly used in General IT, Security
ISO 27001
An international standard on how to manage information security.
You will find this term commonly used in Security, Cybersecurity
ISO Image
A file format that contains the complete content and structure of a CD, DVD, or Blu-ray disc, used for distribution or backup of disc content.
You will find this term commonly used in General IT, Data Management
ISO/IEC 27002
An international standard offering guidelines and best practices for organizational information security standards and information security management practices including the selection, implementation, and management of controls.
You will find this term commonly used in Security, Cybersecurity
ISO/IEC Standards
A series of frameworks and guidelines designed to help organizations ensure that they meet customer and other stakeholder needs within statutory and regulatory requirements related to a product or service.
You will find this term commonly used in General IT, Security
ISP (Internet Service Provider)
Companies that provide consumers and businesses access to the Internet.
You will find this term commonly used in Networking, General IT
Issue Management
The process of identifying, tracking, and resolving issues, bugs, or defects in software development and project management to ensure smooth project progress and product quality.
You will find this term commonly used in General IT, Project Management
Issue Tracking System
Software that manages and maintains lists of issues, as needed by an organization. Issue tracking systems are commonly used in collaborative software development projects.
You will find this term commonly used in Software Development, Management
IT (Information Technology)
The use of computers, storage, networking, and other physical devices, infrastructure, and processes to create, process, store, secure, and exchange all forms of electronic data.
You will find this term commonly used in General IT
IT Asset Disposal (ITAD)
The business built around disposing of obsolete or unwanted equipment in a safe and ecologically-responsible manner, ensuring data privacy and environmental considerations.
You will find this term commonly used in IT Management, Security
IT Asset Management (ITAM)
The process of ensuring an organization's assets are accounted for, deployed, maintained, upgraded, and disposed of when the time comes.
You will find this term commonly used in General IT, Management
IT Audit
The examination and evaluation of an organization's information technology infrastructure, policies, and operations to assess compliance with regulatory standards and to identify risks and security threats.
You will find this term commonly used in IT Governance, Security
IT Benchmarking
The process of comparing one's business processes and performance metrics to industry bests or best practices from other industries to identify areas for improvement.
You will find this term commonly used in General IT, IT Management
IT Capacity Planning
The process of determining the IT infrastructure and resources required to meet future workload demands and performance requirements, ensuring efficient and cost-effective operation.
You will find this term commonly used in IT Management, General IT
Career Path?
Information Security Analyst Career Path
$129.00 $51.60
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path
$99.00 $39.00
Pentester Career Path
$129.00 $51.60
Network Administrator Career Path
$129.00 $51.60
Entry Level Information Security Specialist Career Path
$129.00 $51.60
Comprehensive IT User Support Specialist Training: Accelerate Your Career
$51.60 – $169.00
IT Project Manager Career Path
$129.00 $51.60
Certified Ethical Hacker Career Path
$129.00 $51.60
Data Analyst Career Path
$129.00 $51.60
Leadership Mastery: The Executive Information Security Manager
$129.00 $51.60
Kubernetes Certification: The Ultimate Certification and Career Advancement Series
$129.00 $51.60
Network Security Analyst Career Path
$129.00 $51.60