The following terminology

1. Virtual private network: is a pseudo-device driver and its kernel extension that allows LVM to consider the physical volume located at the remote site as another local physical volume, even though the actual data I/O operations are performed at the remote site.

Mario saves his report on a Virtual Private Network to protect company information.

2. Troubleshootin: Problem solving is the process by which you find a solution to a specific problem or conflict.

3. Dark wed: is the hidden set of Internet sites that can only be accessed through a specialized web browser. It is used to keep Internet activity private and anonymous, which can be useful in both legal and illegal applications.

Search the dark web for interesting and questionable things

4. Blockchain: The term blockchain can be literally translated as “chain of blocks.” In this chain, each block is full of data, that is, the information is recorded and grouped into blocks, and each block functions as a link.

For each programming code when using the float, the text Blockchain must be placed

5. Drone: refers to any unmanned aerial vehicle that is controlled by a human pilot or by a computer with preconfigured commands.

Subtopic

6. Vulnerability assessment: is a cloud-based software model that delivers applications to end users through an Internet browser.

8. Operating system: set of programs that allows us to mInternet of things (IOT): The term IoT, or Internet of Things, refers to the collective network of connected devices and the technology that facilitates communication between devices and the cloud, as well as between the devices themselves.

9. IP Address: stands for “Internet protocol,” which is the set of rules that govern the format of data sent over the Internet or local network. In essence, IP addresses are the identifier that allows information to be sent between devices on a network.

10. Zero trust: It is an infrastructure that is based on the premise that the security of a complex network is always at risk from external and internal threats.

11. System administrator: Systems administration is the work performed by information technology (IT) experts for an organization. Their job is to ensure that computer systems and all related services are working well.

12. Steganography: Steganography is the practice of hiding information within another message or physical object to avoid detection

13. Ransomware: Ransomware, in computing, is a type of malware or malicious code that prevents the use of the equipment or systems it infects. The cybercriminal takes control of the infected computer or system and “hijacks” it in various ways, encrypting the information, locking the screen, etc.

14. Plataformas a service(PaaS): Platform as a Service (PaaS) is a comprehensive cloud environment that includes everything developers need to build, run, and manage applications, from servers and operating systems to networking, storage, middleware, tools, and more.

15. Spoofing: Spoofing is a set of techniques used by attackers to impersonate a trusted person or entity and trick victims into obtaining information

16. Security architect: Security Architects design, develop and implement systems that prevent malware infiltration and other hacker-involved intrusions into the IT network, helping companies and organizations continue their business without having to face costly and costly situations. harmful.

Subtopic

17. QA analyst: QA stands for Quality Assurance, so technically speaking, a job in QA is being a quality analyst. Although it may focus on different types of products and services, its main focus is on the proper functioning of a company's technological solution.

19. Open-source software: Originally, the expression open source (or open source) referred to open source software (OSS). Open source software is code designed to be accessible to the public: everyone can view, modify and distribute the code in any way they see fit.

18. Phishing: The word phishing means identity theft. It is a social engineering technique that cybercriminals use to fraudulently obtain confidential information from users and thus appropriate the identity of those people.

20. 4g,5g,LTE: 4G, the fourth generation of mobile network technology, is the precursor to 5G. In the 2010s, 4G was the most recent and innovative generation of cellular technology, reaching ubiquity within a decade. 5G is the fifth (and most recent) generation of cellular network technology

22. UI/Ux designer: is the professional who is in charge of supervising the user experience, the UX (User Experience), that is, the way in which users interact with a website or an app, or even with a product or service.

21. Virtual reality: Virtual Reality (VR) is an environment of real-looking scenes and objects—generated using computer technology—that creates the user the sensation of being immersed in it.

23 Intel® Threat Detection Technology is a set of technologies that adds a hardware-assisted detection layer to security solutions, increasing protection against advanced threats

24. Threat hunting: It is the active search (or hunt) for potential threats that put the security of a cyber network at risk. This strategy aims to identify, evaluate and neutralize dangers to ensure the good performance of a site, digital platform or virtual workspace.