Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content.
You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Managing your cookies

Our website uses cookies. You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button.

Necessary cookies

These are essential for the user navigation and allow to give access to certain functionalities such as secured zones accesses. Without these cookies, it won’t be possible to provide the service.
Matomo on premise

Marketing cookies

These cookies are used to deliver advertisements more relevant for you, limit the number of times you see an advertisement; help measure the effectiveness of the advertising campaign; and understand people’s behavior after they view an advertisement.
Adobe Privacy policy | Marketo Privacy Policy | MRP Privacy Policy | AccountInsight Privacy Policy | Triblio Privacy Policy

Social media cookies

These cookies are used to measure the effectiveness of social media campaigns.
LinkedIn Policy

Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Skip to main content

 

Digital Vision: Cybersecurity 3

Lexicon

Digital Vision: Cybersecurity 3 – Lexicon

From digital sovereignty to machine learning, this lexicon provides a guide to some of the key terms in cybersecurity

Application Programming Interface (API)

A set of routines, protocols, and tools for building software applications. Put simply, an API specifies how software components should interact.1

Behavioral analytics

Tools that identify aberrant behavior by an individual or a computer that may suggest there is a risk that needs to be addressed (e.g. that a user has become an insider threat or a computer may have been compromised).

Cloud computing

Utilization of remote servers in the data-center of a cloud provider to store, manage, and process data instead of using local computer systems.

Data fusion

The process of integrating multiple data sources to produce more consistent, accurate, and useful information than that provided by any individual data source. 2

Denial of service attack

An attack that stops authorized access to systems or data, or delays technology operations. If more than one source is used to mount the attack, it becomes a distributed denial of service (DDoS) attack.

Digital sovereignty

The concept that an individual or organizations should have sovereignty over their own digital data 3

Domain Name Service (DNS)

The way that internet domain names are located and translated into internet protocol addresses. A domain name is a meaningful and easy-to-remember ‘handle’ for an internet address.

Edge & swarm computing

Edge computing describes compute resources beyond the boundaries of data centres. Swarms are formed when these edge devices are able to interact and co-operate as self-organizing intelligent groups.

Endpoint

An endpoint is a remote computing device that communicates back and forth with a network to which it is connected.4

Firewall

A security system that prevents unauthorized access to systems or data on a private network.

Fourth industrial revolution

The current and developing environment in which disruptive technologies and trends such as the Internet of Things, robotics, virtual reality and artificial intelligence are changing the way we live and work.

General Data Protection Regulation (GDPR)

An EU regulation that places obligations on organizations in relation to the protection of personal data and requirements to report data breaches.

Identity and Access Management (IAM)

A framework of policies and technologies for ensuring that the proper people in an enterprise have the appropriate access to technology resources.5

Incident management

The process that manages the lifecycle of all incidents (unplanned interruptions or reductions in quality of IT services). The primary objective of this Information Technology Infrastructure Library (ITIL) process is to return access to the IT service to users as quickly as possible. 6

Inter-cloud

A single common functionality combining many different individual clouds into one seamless mass in terms of on-demand operations.7

Infrastructure As Code (IAC)

Infrastructure as Code (IaC) uses a high-level descriptive coding language to automate the provisioning of IT infrastructure. This automation eliminates the need for developers to manually provision and manage servers, operating systems, database connections, storage, and other infrastructure elements every time they want to develop, test, or deploy a software application. 8

Malware

A generic term for malicious software that is developed with a hostile intent, for example to damage or gain unauthorized access to a device or network (e.g. worms, viruses, Trojan horses).

Multi-Factor Authentication (MFA)

When a conventional password is used for authentication, there will always be a chance that users and administrators will choose machine-guessable passwords and be susceptible to seeing their security compromised. MFA introduces a second factor, either through phone, a card reader or passcode, to authenticate a user. 9

National Cybersecurity Centre (NCSC)

The UK’s independent authority on cybersecurity.

Patch

A discrete update released by a software vendor to fix vulnerabilities and bugs in existing programmes.

Phishing

A cyber crime in which individuals or companies are contacted by email, text or phone by someone posing as a trust-worthy source in order to trick the recipient to disclose personal or financial details. This can also be an automated process. It is called Spear Phishing if specifically targeted or Whale Phishing if targeted at senior people.10

Playbook

A self-contained set of processes on how to deal with the most common incident types; they include procedures, advice, further enrichment tools and rapid access to the relevant toolsets for remediation.

Privilege Access Management (PAM)

A class of solutions that help secure, control, manage and monitor users’ privileged access to critical assets.10

Quantum encryption

An encryption technology that allows cryptographic (encryption) keys to be exchanged between two parties with guaranteed privacy — typically using photons transmitted through fibre-optic cable. Data transferred in this manner can’t be intercepted or manipulated without leaving clear evidence.

Ransomware

A type of malware that is a form of extortion. It works by encrypting a victim’s hard drive, denying them access to key files. The victim must then pay a ransom to decrypt the files and gain access to them again.

Security Incident Event Management (SIEM)

A tool that collates and analyzes log data coming from a variety of sources to help manage security threats.

Security Operations Centre (SOC)

A facility where analysts work with security tools and threat intelligence to monitor what is happening in the network and take remedial action if issues arise.

Software as a Service (SaaS)

Software as a service (SaaS) is a software distribution model in which a cloud provider hosts applications and makes them available to end users over the cloud. 11

Sovereign cloud

A sovereign cloud is a cloud computing architecture that’s designed and built to provide data access in compliance with local laws and regulations. A sovereign cloud service provider will ensure that each subscriber’s data — including their metadata — is protected from foreign access and stored in compliance with the originating country’s privacy mandates. 12

Terabyte (TB)

A unit of information where a single terabyte is equal to one thousand gigabytes.

User and Entity Behaviour Analytics (UEBA)

A type of cybersecurity process that takes note of the normal conduct of users. In turn, they detect any anomalous behavior or instances when there are deviations from these “normal” patterns. 13

Virus

A type of hidden malware that self-replicates (by copying its own source code) and infects other computer programs by modifying them. A virus cannot run by itself; it requires a host in order to spread. Once infected, computer programs and machines are compromised.

‘Zero-day’ attack

A ‘zero-day’ (or zero-hour or 0-day) attack or threat is a computer threat that tries to exploit computer application vulnerabilities that are unknown to others or undisclosed to the software developer. Zero-day exploits (actual code that can use a security hole to carry out an attack) are used or shared by attackers before the software developer knows about the vulnerability.

Zero trust approach

A zero trust approach is a cybersecurity paradigm focused on resource protection (e.g. services and data) and the premise that trust is never granted implicitly but must be continually evaluated. 14

Digital Vision: Cybersecurity 3 – Further Insights

From across Atos and beyond, find out more about digital transformation, jobs of the future and skills

Share this Page

Kulveer Ranger, SVP, Head of Strategy, Marketing, Communications & Public Affairs, Northern Europe & APAC, Atos