IT Glossary - V - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

VPS (Virtual Private Server)

A virtual machine sold as a service by an Internet hosting service provider.

You will find this term commonly used in Virtualization

VRF (Virtual Routing and Forwarding)

A technology that allows multiple instances of a routing table to coexist within the same router, enabling the creation of virtual networks on shared physical infrastructure.

You will find this term commonly used in Networking

VRRP (Virtual Router Redundancy Protocol)

A networking protocol that provides automatic failover for routers on a LAN, ensuring continuous availability of network services.

You will find this term commonly used in Networking

Vue CLI

A command-line tool for scaffolding Vue.js projects.

You will find this term commonly used in Web Development

Vue.js

An open-source model–view–viewmodel front end JavaScript framework for building user interfaces and single-page applications.

You will find this term commonly used in Web Development

VUI Design

The design of voice user interfaces, where the user interacts with the system through voice or speech commands.

You will find this term commonly used in AI, User Interface

Vulkan API

A low-overhead, cross-platform 3D graphics and computing API, providing high-efficiency, cross-platform access to modern GPUs.

You will find this term commonly used in Software Development, Game Development

Vulnerability

A Vulnerability is a weakness or flaw in a system, application, or network that could be exploited by attackers to compromise the security of the system or access sensitive information. Vulnerabilities need to be identified and patched to prevent exploitation.

You will find this term commonly used in Cybersecurity, Security, General IT

Vulnerability Analysis

The process of identifying, quantifying, and prioritizing vulnerabilities in a system.

You will find this term commonly used in Cybersecurity

Vulnerability Assessment

Vulnerability assessment is the process of identifying, evaluating, and prioritizing security vulnerabilities in computer systems, networks, and applications, followed by recommendations for remediation and risk mitigation.

You will find this term commonly used in Cybersecurity, Security, Risk Management

Vulnerability Assessment Tool

Software tools designed to assess the security vulnerabilities of networks or systems.

You will find this term commonly used in Cybersecurity

Vulnerability Coordination

The process of managing the disclosure of vulnerabilities to ensure they are properly reported, fixed, and disclosed.

You will find this term commonly used in Cybersecurity

Vulnerability Database

A database that stores information about identified security vulnerabilities in software and hardware.

You will find this term commonly used in Cybersecurity

Vulnerability Detection

The process of identifying vulnerabilities in software or systems that could be exploited by attackers.

You will find this term commonly used in Cybersecurity

Vulnerability Disclosure

The process of reporting security vulnerabilities to the appropriate parties, such as software vendors or security researchers, to facilitate the development of patches or mitigations.

You will find this term commonly used in Cybersecurity

Vulnerability Exploit

Code that attackers use to take advantage of a vulnerability in software.

You will find this term commonly used in Cybersecurity

Vulnerability Exploitation

The process of leveraging a security vulnerability to gain unauthorized access or perform malicious actions on a computer system or network.

You will find this term commonly used in Cybersecurity

Vulnerability Exposure

The act of making a software vulnerability known to the public, often with the intention of encouraging the vendor to fix the issue more quickly.

You will find this term commonly used in Cybersecurity

Vulnerability Intelligence

The knowledge obtained about vulnerabilities, including details about their existence, severity, and potential impact, which helps in making informed security decisions.

You will find this term commonly used in Cybersecurity

Vulnerability Management

The ongoing process of identifying, assessing, prioritizing, and mitigating security vulnerabilities in an organization's IT systems.

You will find this term commonly used in Cybersecurity

Vulnerability Mitigation

The process of reducing the severity or impact of a known vulnerability through various means, such as configuration changes, patches, or workarounds.

You will find this term commonly used in Cybersecurity

Vulnerability Patch

A piece of software designed to fix vulnerabilities in software or firmware.

You will find this term commonly used in Cybersecurity

Vulnerability Patch Management

The process of managing the acquisition, testing, and installation of patches to fix vulnerabilities in software and systems.

You will find this term commonly used in Cybersecurity

Vulnerability Patching

The process of applying updates to software or firmware to address security vulnerabilities.

You will find this term commonly used in Cybersecurity

Vulnerability Remediation

The process of fixing or mitigating known vulnerabilities in software or systems to protect against security breaches.

You will find this term commonly used in Cybersecurity

Vulnerability Reporting

The process by which information about security vulnerabilities is formally presented to manufacturers, developers, or the public.

You will find this term commonly used in Cybersecurity

Vulnerability Research

The study and analysis of vulnerabilities in software and systems to understand their causes, implications, and how they can be exploited or mitigated.

You will find this term commonly used in Cybersecurity

Vulnerability Risk Assessment

The process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system.

You will find this term commonly used in Cybersecurity

Vulnerability Scanner

A software tool that scans computer systems or networks for known security vulnerabilities.

You will find this term commonly used in Cybersecurity

Vulnerability Scanning

The automated process of proactively identifying security vulnerabilities of computing systems in a network in order to determine if and where a system can be exploited and/or threatened.

You will find this term commonly used in Security, Cybersecurity

Vulnerability Scoring System

A system used to assign severity scores to vulnerabilities, helping organizations to prioritize their response based on the potential impact.

You will find this term commonly used in Cybersecurity

Vulnerability Testing

The practice of testing software and systems for vulnerabilities that could be exploited by attackers.

You will find this term commonly used in Cybersecurity

VXLAN (Virtual Extensible LAN)

A network virtualization technology that attempts to ameliorate the scalability problems associated with large cloud computing deployments.

You will find this term commonly used in Networking

VxLAN Tunneling

A network virtualization method that uses encapsulation techniques to extend Layer 2 networks over Layer 3 networks.

You will find this term commonly used in Networking

VxWorks

A real-time operating system (RTOS) that can be used in embedded systems.

You will find this term commonly used in Software Development, Embedded Systems

What's Your
Career Path?
ON SALE 60% OFF
Cisco Network Career Path

Cisco Network Engineer Career Path

Master Cisco Networks in this comprehensive training series. Elevate your career today.
Total Hours
126 Hrs 29 Min
icons8-video-camera-58
459 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Specialist

Entry Level Information Security Specialist Career Path

Jumpstart your cybersecurity career with our training series, designed for aspiring entry-level Information Security Specialists.
Total Hours
109 Hrs 39 Min
icons8-video-camera-58
502 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT Project Manager

IT Project Manager Career Path

Explore the role of an IT Project Manager with our comprehensive IT Manager Career Path Series.
Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

$51.60

Add To Cart
ON SALE 61% OFF
ICD 9

ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

The Medical Billing Specialist training series is a comprehensive educational program designed to equip learners with the essential skills and knowledge required in the field of medical billing and coding.
Total Hours
37 Hrs 56 Min
icons8-video-camera-58
192 On-demand Videos

$39.00

Add To Cart
ON SALE 60% OFF
Information Security Analyst Career Path

Information Security Analyst Career Path

Dive into Cybersecurity with our Comprehensive Information Security Analyst training series.
Total Hours
54 Hrs 29 Min
icons8-video-camera-58
215 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Web Designer Career Path

Web Designer Career Path

Explore the theoretical foundations and practical applications of web design to craft engaging and functional websites.
Total Hours
33 Hrs 38 Min
icons8-video-camera-58
171 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
CEH Career Path

Certified Ethical Hacker Career Path

This advanced training series teaches you the skills needed to detect vulnerabilities and weaknesses in computer systems and networks. 
Total Hours
126 Hrs 41 Min
icons8-video-camera-58
804 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Pentester Career Path

Pentester Career Path

Designed to equip aspiring professionals with the skills and knowledge essential for excelling in the field of penetration testing.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Video Editor Career Path

Video Editor Career Path

From mastering editing software to understanding the nuances of visual storytelling, this series is designed for aspiring video editors.
Total Hours
24 Hrs 3 Min
icons8-video-camera-58
154 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Data Analyst Career Path

Data Analyst Career Path

Become a crucial member of your team as a Data Analyst
Total Hours
56 Hrs 36 Min
icons8-video-camera-58
358 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
azure-administrator-career-path

AZ-104 Learning Path : Become an Azure Administrator

Master the skills needs to become an Azure Administrator and excel in this career path.
Total Hours
105 Hrs 42 Min
icons8-video-camera-58
421 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Google DevOps Engineer Career Path

Google DevOps Engineer Career Path

Expand your cloud knowledge or explore this career option as a Google DevOps Engineer.
Total Hours
41 Hrs 50 Min
icons8-video-camera-58
475 On-demand Videos

$51.60

Add To Cart