Cyber Bits
Plain-language notebook of 128 core cyber, network, and automation terms (bits) for small businesses and home offices.
Written for non-technical owners who want quick context without jargon. Visit the main site at https://www.lowcountrycyber.net.
Generated on 2025-11-29
Quick navigation
- Jump by letter in the A-Z index below.
- Jump by category in the By Category index below.
- Use the search box and category filter to narrow results.
A-Z Index
A
- Acceptable Use Policy: An acceptable use policy explains how staff may use company devices and networks.
- Access Control System: An access control system manages badges, keypads, or apps to unlock doors.
- Access Point: An access point is the dedicated device that broadcasts your Wi-Fi network.
- Admin Account: An admin account can change settings, install software, and manage other accounts.
- API Key Management: API key management controls and rotates the secret tokens apps use to talk to each other.
- Asset Inventory: Asset inventory is the list of all hardware and software you own or manage.
- Auto-Updates: Auto-updates automatically install new software patches.
- Automation Platform: An automation platform connects apps and triggers workflows without manual steps.
B
- Backup: Backups are copies of your important data stored somewhere else so you can recover from mistakes, failures, or attacks.
- Bandwidth: Bandwidth is the amount of data your connection can move at once.
- Browser Updates: Browser updates patch security flaws and improve compatibility for web apps.
- Business Continuity Plan: A business continuity plan outlines how the business keeps operating during disruptions.
- Business Email Compromise (BEC): BEC is when attackers hijack or spoof business email to redirect money or data.
- BYOD Policy: A BYOD policy defines how personal devices can be used for work.
C
- Change Management: Change management is the process for planning and approving IT changes.
- Cloud Backup: Cloud backup stores copies of your data in a secure offsite service.
- Compliance Audit: A compliance audit checks whether your practices meet required standards or laws.
- Computer Virus: A virus is malware that spreads by infecting files or programs.
- Credential Stuffing: Credential stuffing is using stolen passwords from one site to break into another.
D
- Data Classification: Data classification labels information by sensitivity, like public or confidential.
- Data Loss Prevention (DLP): DLP tools detect and block sensitive data from leaving through email, web, or devices.
- Data Retention: Data retention sets how long you keep different kinds of data.
- Desktop / Workstation: A desktop or workstation is a fixed employee computer used for daily work.
- Device Offboarding: Device offboarding is retiring or repurposing equipment safely.
- Device Onboarding: Device onboarding is the process of setting up new equipment with the right settings and security.
- DHCP: DHCP automatically hands out IP addresses to devices on your network.
- Digital Certificate: A certificate is a digital ID that proves a website or service is who it claims to be.
- Disaster Recovery: Disaster recovery is the plan to restore systems and data after a major outage or attack.
- Disk Encryption: Disk encryption protects the contents of a device if it is lost or stolen.
- DKIM: DKIM signs outgoing email so recipients can verify it wasn't altered.
- DMARC: DMARC tells receivers how to handle email that fails SPF or DKIM checks.
- DNS: DNS translates easy names like example.com into the numeric addresses computers use.
- DNS Filtering: DNS filtering blocks devices from reaching known malicious or risky domains.
- Documentation: Documentation records how systems are set up and how to operate them.
- Dynamic DNS: Dynamic DNS updates a domain name when your public IP address changes.
E
- Email Encryption: Email encryption protects sensitive messages so only intended recipients can read them.
- Email Filtering: Email filtering inspects messages for spam, malware, and impersonation.
- Encryption: Encryption scrambles data so only authorized people can read it.
- Endpoint Protection: Endpoint protection is security software on laptops and desktops that blocks malware and risky behavior.
- Ethernet: Ethernet is the wired standard for connecting devices with network cables.
F
- Firewall: A firewall is a traffic bouncer that decides which network connections are allowed in or out.
G
- Guest Wi-Fi: Guest Wi-Fi is a separate wireless network for visitors that keeps them away from your business devices and data.
H
- HTTPS: HTTPS is the secure, encrypted version of HTTP used by websites.
I
- Incident Response: Incident response is the process for handling security events and outages.
- Internet Service Provider (ISP): An ISP is the company that sells you internet access and often provides the modem and basic support.
- IoT Hub: An IoT hub connects and manages smart devices like sensors, locks, or lights.
- IP Addressing: IP addressing is the numbering system that lets devices find each other on networks.
- IPv4: IPv4 is the older, widely used internet addressing system with limited addresses.
- IPv6: IPv6 is the newer addressing system with a huge pool of internet addresses.
L
- Laptop: A laptop is a portable computer staff use on the go.
- Least Privilege: Least privilege means users get only the access they need and no more.
- Local Area Network (LAN): A LAN is your internal network that connects devices in one location.
- Log Forwarding: Log forwarding sends copies of logs to a central place for analysis.
- Logging: Logging records what systems and users are doing over time.
M
- Malware: Malware is malicious software designed to harm or steal from your systems.
- Mesh Wi-Fi: Mesh Wi-Fi uses multiple access points that work together to cover a whole building.
- MFA (Multi-Factor Authentication): MFA adds an extra step to logins, like a code on your phone, so a stolen password by itself isn't enough.
- Mobile Device Management (MDM): MDM is software that enforces security settings on phones and tablets.
- Modem: The modem is the device that speaks the language of your internet provider and brings the connection into your building.
- Monitoring Alerts: Monitoring alerts notify you when systems are down or behaving abnormally.
N
P
- Passphrase: A passphrase is a longer, easier-to-remember password made of several words.
- Password: A password is the secret phrase used to prove who you are when logging in.
- Password Manager: A password manager is a secure vault that stores and fills your passwords so you don't reuse or write them on sticky notes.
- Password Policy: A password policy sets rules for creating and managing passwords.
- Patching: Patching means installing updates that fix security bugs and stability issues.
- PCI DSS: PCI DSS is the security standard for handling payment card data.
- Penetration Test: A penetration test simulates an attack to find weaknesses in your defenses.
- Phishing: Phishing is when attackers send fake emails or messages to trick you into giving up info or clicking malware.
- Physical Security: Physical security protects buildings, rooms, and hardware from unauthorized access.
- Port Forwarding: Port forwarding tells your router to send specific incoming traffic to a device inside your network.
- POS Terminal: A POS terminal is the card reader or register that processes customer payments.
- Power over Ethernet (PoE): PoE sends power and data over one Ethernet cable to devices like phones or cameras.
- Privacy Policy: A privacy policy explains what data you collect and how you use and protect it.
Q
R
- RAID: RAID combines multiple disks for redundancy or speed in servers and NAS devices.
- Ransomware: Ransomware is malware that encrypts your files and demands payment to unlock them.
- Remote Access: Remote access lets staff reach office resources from home or on the road.
- Remote Desktop: Remote desktop lets you view and control a computer from afar.
- Remote Monitoring and Management (RMM): RMM tools let you monitor, patch, and support devices remotely.
- Remote Wipe: Remote wipe lets you erase a device's data if it is lost or stolen.
- Remote Work Policy: A remote work policy sets expectations and requirements for working offsite.
- Role-Based Access Control (RBAC): RBAC assigns permissions based on job roles instead of individuals.
- Router: The router is the box that connects your home or office network to the internet and decides where traffic goes.
- Runbook: A runbook is a step-by-step guide for handling routine tasks or incidents.
S
- Scheduled Tasks: Scheduled tasks run jobs automatically at set times.
- Secrets Management: Secrets management stores passwords, keys, and certificates securely for apps and admins.
- Secrets Vault: A secrets vault is the protected storage location for credentials and keys.
- Security Awareness Training: Security awareness training teaches staff how to spot and avoid common threats.
- Security Camera: A security camera records video for safety and monitoring.
- Server: A server is a computer that provides shared services like files, apps, or databases.
- Service Account: A service account is used by applications or automations instead of people.
- Service Level Agreement (SLA): An SLA is a contract that defines service expectations like uptime and response times.
- SIEM: A SIEM collects and correlates logs to spot suspicious activity.
- Smart Lock: A smart lock is a networked door lock that can be controlled or monitored remotely.
- Smart TV: A smart TV is an internet-connected display for streaming or signage.
- Social Engineering: Social engineering is tricking people into giving access or information.
- Spam Filtering: Spam filtering blocks junk and malicious email before it reaches users.
- Spear Phishing: Spear phishing is a targeted scam email crafted for a specific person or role.
- SPF: SPF is a DNS record that lists which servers can send email for your domain.
- Split Tunneling: Split tunneling lets some traffic go through a VPN while other traffic goes direct to the internet.
- Spyware: Spyware secretly monitors activity or steals information from a device.
- SSL/TLS: SSL/TLS is the encryption that protects data in transit between browsers and services.
- Standard Account: A standard account is an everyday user login with limited permissions.
- Static IP: A static IP is an address that does not change over time.
- Stolen Device: A stolen device incident is when a laptop or phone goes missing and may expose data.
T
- Trojan: A trojan is malware that pretends to be legitimate software to get installed.
U
V
- Vendor Management: Vendor management tracks third-party providers, their access, and their performance.
- Visitor Management: Visitor management tracks who enters your space and where they can go.
- VLAN (Virtual LAN): A VLAN is a way to slice one physical network into multiple logical networks, each with its own rules and boundaries.
- VoIP Phone: A VoIP phone makes calls over the internet instead of phone lines.
- VPN (Virtual Private Network): A VPN creates an encrypted tunnel so remote staff can securely connect into your office network or cloud systems.
- Vulnerability Scan: A vulnerability scan checks systems for known security holes.
W
- Webhook: A webhook is a push notification from one service to another when something happens.
- Wi-Fi Security: Wi-Fi security covers encryption, passwords, and settings that protect wireless networks.
- Wi-Fi SSID: An SSID is the network name you see when connecting to Wi-Fi.
- Wide Area Network (WAN): A WAN links multiple sites or remote users over the internet or private circuits.
- Worm: A worm is malware that spreads itself across networks without user action.
- WPA3: WPA3 is the latest Wi-Fi security standard that improves encryption and login strength.
Z
- Zero Trust: Zero Trust means no device or user is trusted by default; every access is verified each time.
By Category Index
Automation
- Auto-Updates: Auto-updates automatically install new software patches.
- Automation Platform: An automation platform connects apps and triggers workflows without manual steps.
- Log Forwarding: Log forwarding sends copies of logs to a central place for analysis.
- Monitoring Alerts: Monitoring alerts notify you when systems are down or behaving abnormally.
- Remote Monitoring and Management (RMM): RMM tools let you monitor, patch, and support devices remotely.
- Scheduled Tasks: Scheduled tasks run jobs automatically at set times.
- Webhook: A webhook is a push notification from one service to another when something happens.
Hardware
- Access Control System: An access control system manages badges, keypads, or apps to unlock doors.
- Access Point: An access point is the dedicated device that broadcasts your Wi-Fi network.
- Desktop / Workstation: A desktop or workstation is a fixed employee computer used for daily work.
- IoT Hub: An IoT hub connects and manages smart devices like sensors, locks, or lights.
- Laptop: A laptop is a portable computer staff use on the go.
- Modem: The modem is the device that speaks the language of your internet provider and brings the connection into your building.
- Network Printer: A network printer can be reached over Wi-Fi or Ethernet by multiple users.
- Network Switch: A switch connects multiple wired devices so they can talk inside your network.
- Network Video Recorder (NVR): An NVR stores video from IP security cameras on your network.
- Network-Attached Storage (NAS): A NAS is a small file server for shared storage and backups on your network.
- POS Terminal: A POS terminal is the card reader or register that processes customer payments.
- Power over Ethernet (PoE): PoE sends power and data over one Ethernet cable to devices like phones or cameras.
- RAID: RAID combines multiple disks for redundancy or speed in servers and NAS devices.
- Security Camera: A security camera records video for safety and monitoring.
- Server: A server is a computer that provides shared services like files, apps, or databases.
- Smart Lock: A smart lock is a networked door lock that can be controlled or monitored remotely.
- Smart TV: A smart TV is an internet-connected display for streaming or signage.
- Uninterruptible Power Supply (UPS): A UPS is a battery that keeps equipment running through short power losses.
- VoIP Phone: A VoIP phone makes calls over the internet instead of phone lines.
Network
- Bandwidth: Bandwidth is the amount of data your connection can move at once.
- DHCP: DHCP automatically hands out IP addresses to devices on your network.
- DNS: DNS translates easy names like example.com into the numeric addresses computers use.
- Dynamic DNS: Dynamic DNS updates a domain name when your public IP address changes.
- Ethernet: Ethernet is the wired standard for connecting devices with network cables.
- Guest Wi-Fi: Guest Wi-Fi is a separate wireless network for visitors that keeps them away from your business devices and data.
- Internet Service Provider (ISP): An ISP is the company that sells you internet access and often provides the modem and basic support.
- IP Addressing: IP addressing is the numbering system that lets devices find each other on networks.
- IPv4: IPv4 is the older, widely used internet addressing system with limited addresses.
- IPv6: IPv6 is the newer addressing system with a huge pool of internet addresses.
- Local Area Network (LAN): A LAN is your internal network that connects devices in one location.
- Mesh Wi-Fi: Mesh Wi-Fi uses multiple access points that work together to cover a whole building.
- Network Address Translation (NAT): NAT lets many devices share one public internet address by rewriting traffic.
- Network Ports: Ports are numbered doors that network traffic uses to reach the right app or service.
- Port Forwarding: Port forwarding tells your router to send specific incoming traffic to a device inside your network.
- Quality of Service (QoS): QoS lets you prioritize important traffic like calls over less urgent traffic.
- Remote Access: Remote access lets staff reach office resources from home or on the road.
- Remote Desktop: Remote desktop lets you view and control a computer from afar.
- Router: The router is the box that connects your home or office network to the internet and decides where traffic goes.
- Split Tunneling: Split tunneling lets some traffic go through a VPN while other traffic goes direct to the internet.
- Static IP: A static IP is an address that does not change over time.
- VLAN (Virtual LAN): A VLAN is a way to slice one physical network into multiple logical networks, each with its own rules and boundaries.
- VPN (Virtual Private Network): A VPN creates an encrypted tunnel so remote staff can securely connect into your office network or cloud systems.
- Wi-Fi SSID: An SSID is the network name you see when connecting to Wi-Fi.
- Wide Area Network (WAN): A WAN links multiple sites or remote users over the internet or private circuits.
Ops
- Admin Account: An admin account can change settings, install software, and manage other accounts.
- Asset Inventory: Asset inventory is the list of all hardware and software you own or manage.
- Backup: Backups are copies of your important data stored somewhere else so you can recover from mistakes, failures, or attacks.
- Business Continuity Plan: A business continuity plan outlines how the business keeps operating during disruptions.
- Change Management: Change management is the process for planning and approving IT changes.
- Cloud Backup: Cloud backup stores copies of your data in a secure offsite service.
- Device Offboarding: Device offboarding is retiring or repurposing equipment safely.
- Device Onboarding: Device onboarding is the process of setting up new equipment with the right settings and security.
- Disaster Recovery: Disaster recovery is the plan to restore systems and data after a major outage or attack.
- Documentation: Documentation records how systems are set up and how to operate them.
- Incident Response: Incident response is the process for handling security events and outages.
- Logging: Logging records what systems and users are doing over time.
- Patching: Patching means installing updates that fix security bugs and stability issues.
- Runbook: A runbook is a step-by-step guide for handling routine tasks or incidents.
- Service Account: A service account is used by applications or automations instead of people.
- Service Level Agreement (SLA): An SLA is a contract that defines service expectations like uptime and response times.
- Standard Account: A standard account is an everyday user login with limited permissions.
- Uptime Monitoring: Uptime monitoring checks whether your websites or services are reachable.
- Vendor Management: Vendor management tracks third-party providers, their access, and their performance.
- Visitor Management: Visitor management tracks who enters your space and where they can go.
Policy
- Acceptable Use Policy: An acceptable use policy explains how staff may use company devices and networks.
- BYOD Policy: A BYOD policy defines how personal devices can be used for work.
- Compliance Audit: A compliance audit checks whether your practices meet required standards or laws.
- Data Classification: Data classification labels information by sensitivity, like public or confidential.
- Data Retention: Data retention sets how long you keep different kinds of data.
- Least Privilege: Least privilege means users get only the access they need and no more.
- Password Policy: A password policy sets rules for creating and managing passwords.
- PCI DSS: PCI DSS is the security standard for handling payment card data.
- Privacy Policy: A privacy policy explains what data you collect and how you use and protect it.
- Remote Work Policy: A remote work policy sets expectations and requirements for working offsite.
- Role-Based Access Control (RBAC): RBAC assigns permissions based on job roles instead of individuals.
- Security Awareness Training: Security awareness training teaches staff how to spot and avoid common threats.
Security
- API Key Management: API key management controls and rotates the secret tokens apps use to talk to each other.
- Browser Updates: Browser updates patch security flaws and improve compatibility for web apps.
- Business Email Compromise (BEC): BEC is when attackers hijack or spoof business email to redirect money or data.
- Computer Virus: A virus is malware that spreads by infecting files or programs.
- Credential Stuffing: Credential stuffing is using stolen passwords from one site to break into another.
- Data Loss Prevention (DLP): DLP tools detect and block sensitive data from leaving through email, web, or devices.
- Digital Certificate: A certificate is a digital ID that proves a website or service is who it claims to be.
- Disk Encryption: Disk encryption protects the contents of a device if it is lost or stolen.
- DKIM: DKIM signs outgoing email so recipients can verify it wasn't altered.
- DMARC: DMARC tells receivers how to handle email that fails SPF or DKIM checks.
- DNS Filtering: DNS filtering blocks devices from reaching known malicious or risky domains.
- Email Encryption: Email encryption protects sensitive messages so only intended recipients can read them.
- Email Filtering: Email filtering inspects messages for spam, malware, and impersonation.
- Encryption: Encryption scrambles data so only authorized people can read it.
- Endpoint Protection: Endpoint protection is security software on laptops and desktops that blocks malware and risky behavior.
- Firewall: A firewall is a traffic bouncer that decides which network connections are allowed in or out.
- HTTPS: HTTPS is the secure, encrypted version of HTTP used by websites.
- Malware: Malware is malicious software designed to harm or steal from your systems.
- MFA (Multi-Factor Authentication): MFA adds an extra step to logins, like a code on your phone, so a stolen password by itself isn't enough.
- Mobile Device Management (MDM): MDM is software that enforces security settings on phones and tablets.
- Passphrase: A passphrase is a longer, easier-to-remember password made of several words.
- Password: A password is the secret phrase used to prove who you are when logging in.
- Password Manager: A password manager is a secure vault that stores and fills your passwords so you don't reuse or write them on sticky notes.
- Penetration Test: A penetration test simulates an attack to find weaknesses in your defenses.
- Phishing: Phishing is when attackers send fake emails or messages to trick you into giving up info or clicking malware.
- Physical Security: Physical security protects buildings, rooms, and hardware from unauthorized access.
- Ransomware: Ransomware is malware that encrypts your files and demands payment to unlock them.
- Remote Wipe: Remote wipe lets you erase a device's data if it is lost or stolen.
- Secrets Management: Secrets management stores passwords, keys, and certificates securely for apps and admins.
- Secrets Vault: A secrets vault is the protected storage location for credentials and keys.
- SIEM: A SIEM collects and correlates logs to spot suspicious activity.
- Social Engineering: Social engineering is tricking people into giving access or information.
- Spam Filtering: Spam filtering blocks junk and malicious email before it reaches users.
- Spear Phishing: Spear phishing is a targeted scam email crafted for a specific person or role.
- SPF: SPF is a DNS record that lists which servers can send email for your domain.
- Spyware: Spyware secretly monitors activity or steals information from a device.
- SSL/TLS: SSL/TLS is the encryption that protects data in transit between browsers and services.
- Stolen Device: A stolen device incident is when a laptop or phone goes missing and may expose data.
- Trojan: A trojan is malware that pretends to be legitimate software to get installed.
- USB Security: USB security covers safe use of flash drives and external devices.
- Vulnerability Scan: A vulnerability scan checks systems for known security holes.
- Wi-Fi Security: Wi-Fi security covers encryption, passwords, and settings that protect wireless networks.
- Worm: A worm is malware that spreads itself across networks without user action.
- WPA3: WPA3 is the latest Wi-Fi security standard that improves encryption and login strength.
- Zero Trust: Zero Trust means no device or user is trusted by default; every access is verified each time.