Cloud.
This is a terminology that is used to refer to the technology that allows individuals and organizations to host their applications and data over the network (Caulfield et al., 2016). The technology also enables users to access the hosted data and applications from anywhere they are if they have a device that connects to the internet. This is because these files are accessed through the internet.
Software. This is a collection of computer programs that have been programmed to give the computer instructions on what to do. An excellent example of software is an antivirus that tells the computer to run a self-scan to identify any viruses that may be available in the computer as well as identifying all the affected files and programs in that computer (Smith et al., 2016).
Virtual Private Network (VPN). These are tools that are used to mask the location of a network user and encrypt traffic, thereby allowing the internet user to remain anonymous when he or she is using the internet (Hengeveld, 2016).
IP Address. This is an address that is used to identify computers that are connected to the internet while they are communicating with other computers communicated in the same network (Miller & Voegele, 2016). This address keeps changing every time a machine is connected to a different network.
Breach. This is the action of gaining access to a computer or a device by a hacker or attacker, after successful exploitation of a vulnerability (Bai et al., 2016). The two common types of breaches are a security breach and data breach. A successful security breach, in most cases, leads to a data breach. These two terms are usually misunderstood with some people even trying to use them interchangeably. Exploited vulnerabilities will lead to a security breach, and security breaches will lead to data breaches.
Vulnerability. This is a weakness in a computer application or an organization setup that can be exploited by hackers to gain any unauthorized access to the computers system. Vulnerabilities may vary with examples being the use of weak passwords that can be easily guessed by the attacker and use them to sign into the system.
Bring Your Device (BYOD). This is a security policy that most organizations use to set a limitation on connecting to the organization network using personal devices such as smartphones and laptops. This policy will be used by institutions to allow employees to carry along their devices to work.
Distributed Denial of Service (DDoS). This is a type of attack that will be used by hackers to make a given service or application unusable. This is achieved by creating traffic from several sources. The traffic is usually overwhelmed by numerous requests that service or program cannot respond to, making the system extremely slow and eventually unusable completely (Kolias et al., 2017).
Machine Learning. This is the process of designing systems that can make decisions based on the information that is presented to them (Biamonte et al., 2017).
Supervised learning. This is the process of training programs on a predefined set of data so that the program can use such datasets to make decisions meant to be accurate (Zhai et al., 2019).
Unsupervised Learning. These are programs that have been designed to make accurate decisions based on the available datasets without prior training (Hsu et al., 2018).
Classification. This is a subcategory of supervised learning that is used for predicted values that do fall on a continuous spectrum (Tharwat, 2020). Good examples of regression are questions such as how many? Or how long?