IT Jargon buster
IT is renowned for using abbreviations and overly technical jargon. This article is trying to break down the barriers and give you some analogies to better understand what we are talking about!
Abbreviation / Jargon
Say what?
Non technical analogy -
Authentication
In the context of computer systems, authentication is a process that ensures and confirms a user’s identity
You go and visit your neighbour. You knock at his door.
He looks through the peephole, and then he recognises you (authentication).
He opens the door and invites you in.
You talk to him and start feeling comfortable, so you go sit on the sofa. He has no problem with this (you are authorised to do this).
You even use his toilet (still authorised).
After some time you feel hungry and try to open his fridge to have a look. He stops you and says that you are not allowed to do this (not authorised). Maybe his best friend is allowed... (he might be authorised)
Authorisation
Authorisation is the process of giving someone the ability to access a resource.
See above
Cloud Services
Servers and systems which are not run physically on the hospital site, or on our owned hardware but are securely managed by Large providers of such services on our behalf and accessed through encrypted and secure connections over the internet
Cloud computing is like giving IT thermostats that we can turn on, up, down, or off based on our needs. Need extra processing power to cover the peak period? Crank it up – and then turn it down when finished.
DNS
Domain Name System - DNS is an Internet service that translates domain names to IP addresses. Domain names are alphabetic and therefore easy to remember, but the Internet is based on numeric IP addresses, so a DNS server is required for computers to communicate with one another.
Think of it as the contact record/phonebook of the internet; rather than remembering every site's number, you simply look up their name. So, for the BBC we do not need to remember 212.58.244.71 we just look up www.bbc.co.uk.
IP Address
Internet protocol address - It is an identifying number that is associated with a specific computer or computer network. When connected to the internet, the IP address allows the computers to send and receive information.
Imagine your device (like a computer, smartphone, or tablet) is a house, and the internet is like a giant city where all the houses are connected. Just like each house in a city has a unique postal address, each device connected to the internet has a unique Internet Protocol (IP) address.
IT
Information Technology
MAC Address
"Media Access Control Address" and no, it is not related to Apple Macs! A MAC address is a hardware identification number that uniquely identifies each device on a network. The MAC address is manufactured into every network card, such as an Ethernet card or Wi-Fi card, and therefore cannot be changed.
Think about mail delivery: While an IP address can be thought of as your home address- something which can change, and often does- a MAC address is your physical identity- your name, DOB etc.
MDE (Previously ATP)
Microsoft Defender for Endpoint (Advanced Threat Protection) is a holistic, cloud-delivered, endpoint security solution. Its main features are:
- Risk-based vulnerability management and assessment
- Attack surface reduction
- Behavioral based and cloud-powered protection
- Endpoint detection and response (EDR)
- Automatic investigation and remediation
- Managed hunting services
Imagine your computer is like a castle, and it needs protection from invaders like viruses, malware, and other malicious software. Microsoft Defender is like the loyal guards stationed at the castle gates, constantly vigilant and ready to defend against any threats that try to sneak in.
Just like guards patrol the castle walls, Microsoft Defender patrols your computer's files and programs, keeping a lookout for anything suspicious. If it detects a potential threat, it springs into action, blocking the intruder from entering and keeping your castle safe.
MFA
Multi-factor authentication (MFA; two-factor authentication, or 2FA, along with similar terms) is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism. MFA protects personal data—which may include personal identification or financial assets—from being accessed by an unauthorised third party that may have been able to discover, for example, a single password.
Multi-Factor Authentication (MFA) is like having multiple locks on your door instead of just one.
- Your username and password act as the first lock, just like using a key to open a door.
- MFA adds an extra lock, which could be something you have (like a keycard or phone) or something you are (like a fingerprint or facial recognition).
Phishing
The fraudulent practice of sending emails purporting to be from reputable companies to induce individuals to reveal personal information, such as passwords and credit card numbers.
The term phishing is an analogy to fishing – a fisher throwing a baited hook into the ocean, hoping for a catch, is exactly like a hacker sending out phishing emails, hoping that a user will take the bait.