MAIN MENU
Devolutions Blog

Announcements, updates, and insights from Devolutions.

Security
IT security glossary devolutions blog

[NEW] IT Security Glossary of Terms

One of the signature characteristics of the IT landscape is the sheer volume of unique terms that are used on a regular basis. Indeed, to outsiders it can seem like IT pros are speaking a completely...

Photo of Laurence Cadieux Laurence Cadieux

One of the signature characteristics of the IT landscape is the sheer volume of unique terms that are used on a regular basis. Indeed, to outsiders it can seem like IT pros are speaking a completely different language — and in a sense, they are!

To help turn some of this confusion into clarity, we have created a new IT Security Glossary of Terms.

Naturally, experienced IT pros will be very familiar with these terms. However, as we all know a quick refresher never hurts!

More practically, we invite IT pros to share this glossary with their colleagues and customers who may struggle to understand various terms and concepts. For example, they may think that “Credential Injection” and “SQL Injection” are the same thing, or fail to grasp that access to a “Privileged Session” is granted on a temporary vs. permanent basis.

Currently, the glossary contains nearly 150 unique IT security terms, and we will be constantly adding more. Here is a snapshot of 30 terms that you will find:

Click here to access the full IT Security Glossary of Terms. We are constantly updating the glossary, so remember to bookmark the page.

Indeed, while it is very difficult to predict what the world will look like a year — or even a month — from now, one thing is certain: there will always be more (and more and more) terms to add to the ever-growing IT security vocabulary!

More from Security

Read more articles