| A | B |
| Intranet | a local or restricted communications network, especially a private network - ie. Webpage that can only be viewed or used while inside a companies network |
| Extranet | an intranet that can be partially accessed by authorized outside users, enabling businesses to exchange information over the Internet securely. |
| Microsoft Sharepoint | a browser-based collaboration and document management platform from Microsoft It allows groups to set up a centralized, password protected space for document sharing. |
| Host Based Firewall | installed on each individual server that controls incoming and outgoing network traffic and determines whether to allow it into a particular device (i.e. the Microsoft firewall that comes with a Windows-based computer). |
| Network Based Firewall | is a firewall that is built into the infrastructure of the cloud (i.e. Amazon’s firewall in AWS environments) or a virtual firewall service such as those offered by Cisco, VMware and Check Point. |
| Networking Port | In computer networking, port numbers are part of the addressing information used to identify the senders and receivers of messages. |
| Cloud Computing | Computing done where part of the computing is not done on your device |
| Office 365 | Cloud (SaaS) based Microsoft Applications including Word, Excel and PowerPoint |
| Authentication | The process of identifying an individual, usually based on a username and password. |
| Multifactor Authentication | is a security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity for a login or other transaction. |
| Smart Card | Pocket sized card that has a chip inside of it. It it typically used for authentication. |
| Windows Rights Management Services | is a Microsoft Windows security tool that provides persistent data protection by enforcing data access policies. |
| On-premises | Work is done inside your domain and not on the cloud. |
| Biometrics | are unique physical characteristics, such as fingerprints, that can be used for automated recognition. |
| Strong passwords | a good password has 8 characters and includes both uppercase and lowercase letters, numbers and at least one special character. Do NOT use words. |
| Group Polices | is a hierarchical infrastructure that allows a network administrator in charge of Microsoft's Active Directory to implement specific configurations for users and computers. Group Policy can also be used to define user, security and networking policies at the machine level. |
| Permissions | a level on which users can access resources (files, apps, folders, etc._ |
| Rights | the level to to which someone can customize their environment |
| Resulted Permissions | the cumulative result of permissions assigned to for default groups or users |
| Smart Screen Filter | a Microsoft filtering tool designed to detect and block suspicious and malicious sites, applications and files. The program checks the safety of websites and downloads and tracks malware and phishing attempts |
| Virus | a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data. |
| Worm | is a standalone malware computer program that replicates itself in order to spread to other computers. |
| Trojan Horse | is a type of malware that is often disguised as legitimate software. |
| RootKit | a collection of computer software, typically malicious, designed to enable access to a computer or areas of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software. |
| Malware | malicious software |
| Spyware | is software that aims to gather information about a person or organization without their knowledge, that may send such information to another entity without the consumer's consent, or that asserts control over a device without the consumer's knowledge. |
| Cookies | A small text file (up to 4KB) created by a website that is stored in the user's computer either temporarily for that session only or permanently on the hard disk (persistent cookie). Cookies provide a way for the website to recognize you and keep track of your preferences. |
| AdWare | software that automatically displays or downloads advertising material (often unwanted) when a user is online. |
| Windows Defender | s malware protection that is included with and built into Windows 8 & 10 |