User Manual

> White Paper | Best Practices in Digital Transformation
33
Malware
Malicious software including Trojans, viruses, worms and other
forms of hostile or intrusive software.
MTDC
Multi-tenant data center. These are service data centers that share
raised-floor space, power and cooling between tenants. They may
be shared facilities leased out commercially or data centers run for
client groups within a single organisation.
Network (Behaviour) Anomaly Detection
The monitoring of networks for unusual or outlier behavior or
trends.
NGFW
Next-generation firewalls.
NIST
The National Institute of Standards and Technology in the United
States which focuses on measurement science, standards and
technology.
NOC
Network Operations Center.
On-prem data center
A data center run by an organisation to service its own IT
requirements. It may also be referred to as a captive, in-house or
enterprise data center depending on the organisation.
OSS
Open Source Software.
OT
Operational Technology.
PaaS
Platform as a Service.
Phishing
Illegitimate requests to try and obtain information and passwords.
Ponemon Institute
Institute that conducts independent research on issues of privacy,
data protection and data security.
Ransomware
Where data is held for ransom supposedly until a ransom is paid.
RCI
Root Cause Isolation = analysis involves an automatic investigation
of problem KPIs and diagnosis regarding failure
RFID tags
Identity and access tags activated by radio frequency.
ROI
Return on Investment.
SaaS
Software as a Service.
SLA
Service Level Agreement.
SME
Small and medium enterprises.
Social media threats
Cyberthreats transmitted via social media.
Software-Defined
Used here in relation to Security (SDS) and Infrastructure (SDI) –
technical computing infrastructure controlled by software with no
operator or human intervention.
Spear phishing
Electronic scams targeted to specific individuals or organisation
usually intended to steal data or install malware.
Utilisation
The metric of how much of an available resource is actually
consumed. Used here for IT and power.
Virtual reality
The simulation of a person or device within a computer generated
‘virtual’ world. Augmented reality may be considered a form of
virtual reality as it superimposes layers of virtual information over
the experience of either the real or a virtual world.
Virtualization
Digital versions of ‘actual’ computing, network or storage devices or
resources.
VLAN
Virtual local area networks.
VM
Virtual machines – the virtualized equivalent of a ‘real’ computer.
WAN
Wide Area Networking that extends beyond local or metropolitan
networks to cover a large geographic areas.