Password guessing
Password guessing: The method where an unauthorized entity tries to gain access to a system by guessing the password. This is usually done through brute force methods (trying all possible combinations) or, more commonly, by using lists of commonly used passwords. Password guessing can be mitigated by enforcing complexity requirements and limiting the number of […]
Patch Management
Patch Management: The process of identifying, testing, and deploying patches in a controlled and timely manner. Used to maintain the security and reliability of computer systems. Examples -creating a patch schedule and plan for a network of servers, testing patches in a sandbox environment before deployment, and using automated tools to distribute and apply patches […]
Patch
Patch: A small piece of software designed to fix a specific problem or vulnerability in a system or application. Used to improve security and stability of computer systems. Examples -a security patch for a web browser to fix a known vulnerability, a patch for an operating system to fix a bug causing crashes, and a […]
Optical Scanner
Optical Scanner: A device that converts images, printed text, handwriting, or an object into a digital image. It’s widely used to digitize physical photographs and documents so they can be edited, stored, and shared electronically. Its usage plays a crucial role in maintaining digital records and reducing paper clutter.
Orphaned software
Orphaned software: A program or application that’s no longer supported or updated by its creators or maintainers. This can pose a serious risk as new vulnerabilities discovered in the software cannot be patched, potentially leaving systems susceptible to exploits. Organizations often replace orphaned software with supported alternatives to mitigate this risk.
Operation and Maintenance (O&M)
Operation and Maintenance (O&M): The ongoing processes and activities required to manage and sustain the functionality of an organization’s IT systems. O&M includes routine updates, technical support, system repairs, and the continuous improvement of operational workflows and IT infrastructure.