Technology Terms |
<tek ‘no Lu jE tRmz> |
|
A/B Testing |
<A bE ‘tes ting> |
|
ability |
< u ‘bi Lu tE> |
|
access |
<‘ak ses> |
|
access control |
<‘ak ses kun ‘tROL> |
|
accounting |
<u ‘koOOn ting> |
|
addition |
<u ‘di shun> |
|
address |
<u ‘dRes> <‘ad dRes> |
|
adequate |
<‘a du kOOut> |
|
administrative/special access account |
<ud ‘mi nu stRA tiv ‘spe shuL ‘ak ses u ‘koOOnt> |
|
administrator |
<ud ‘mi nu stRA tR> |
|
advance |
<ud ‘vans> |
|
affiliate marketing |
<u ‘fi LE ut ‘moR ku ting> |
|
algorithm |
<‘aL gu Ri THum> |
|
analysis |
<u ‘na Lu sus> |
|
analysts |
<‘a nu Lusts> |
|
analyze |
<‘a nu LIz> |
|
annual |
<‘an EOO uL> |
|
anti-malware software |
<‘an tI maL OOAR ‘soft OOAR> |
|
application |
<a pLu ‘kA shun> |
|
application programming interface (API) |
<a pLu ‘kA shun pRO ‘gRa ming ‘in tR fAs> <A pE I > |
|
architect |
<‘oR ku tekt> |
|
area |
<‘e RE u> |
|
areas containing critical infrastructure |
<‘e RE uz kun ‘tA ning ‘kRi ti kuL ‘in fRu stRuk chR> |
|
arise |
<u ‘RIz> |
|
associate |
<u ‘sO shE At> <u ‘sO shE ut> |
|
ASU in security policy |
<A es U in si ‘kER u tE ‘po Lu sE> |
|
at-rule |
<at ‘ROOL> |
|
attributes |
<‘a tRu bEOOts> <u ‘tRi bEOOts> |
|
authentication |
<u then ti ‘kA shun> |
|
authorization |
<o thR u ‘zA shun> |
|
availability |
<u vA Lu ‘bi Lu tE> |
|
back end development |
<‘ba kend di ‘ve Lup munt> |
|
background |
<‘ba gRoOOnd> |
|
backup |
<‘ba kup> |
|
big data |
<big ‘dA tu> |
|
biometric authentication |
<bI O ‘me tRik u then ti ‘kA shun> |
|
biometrics |
<bI O ‘me tRiks> |
|
bounce rate |
<‘boOOns RAt> |
|
breadcrumbs |
<‘bRed kRumz> |
|
bugs |
<bugz> |
|
bus |
<bus> |
|
business |
<‘biz nus> |
|
business continuity plan (BCP) |
<‘biz nus kon tu ‘nOO u tE pLan> <bE sE pE> |
|
cache |
<kash> |
|
call to action (CTA) |
<koL tu ‘ak shun> <sE tE A> |
|
carpal |
<‘koR puL> |
|
carrier |
<‘ke RE R> |
|
cascading style sheet (CSS) |
<kas ‘kA ding stIL shEET> <sE es es> |
|
category-1 data |
<‘ka du gOR E OOun ‘dA tu> |
|
centralized storage |
<‘sen tRu LIzd ‘stOR ij> |
|
certification |
<sR du fu ‘kA shun> |
|
change |
<chAnj> |
|
change management |
<chAnj ‘ma nij munt> |
|
chapter |
<‘chap tR> |
|
character |
<‘keR ik tR> |
|
chief |
<chEf> |
|
click through rate (CTR) |
<kLik thROO Rat> <sE tE oR> |
|
clickstream |
<‘klik stREm> |
|
cloud computing |
<kLoOOd kum ‘pEOO ting> |
|
code |
<kOd> |
|
coding |
<‘kO ding> |
|
color theory |
<‘ku LR ‘thER E> |
|
color value |
<‘ku LR ‘vaL EOO> |
|
comment |
<‘ko ment> |
|
common secure configurations |
<‘ko mun si ‘kER kun fi gER ‘A shunz> |
|
communicate |
<ku ‘mEOO nu kAt> |
|
communication |
<ku mEOO nu ‘kA shun> |
|
competitive |
<kum ‘pe tu tiv> |
|
computer |
<kum ‘pEOO tR> |
|
computer security incident |
<kum ‘pEOO tR si ‘kER u tE ‘in su dunt> |
|
computing |
<kum ‘pEOO ting> |
|
concentrate |
<‘kon sun tRAt> |
|
confidential |
<kon fu ‘den shuL> |
|
confidential information |
<kon fu ‘den shuL in fR ‘mA shun> |
|
confidentiality |
<kon fu den shE ‘aL u tE> |
|
considerable |
<kun ‘si dR u bL> |
|
consultant |
<kun ‘suL tunt> |
|
consulting |
<kun ‘suL ting> |
|
content curation |
<‘kon tent kER ‘A shun> |
|
content marketing |
<‘kon tent ‘moR ku ting> |
|
control |
<kun ‘tROL> |
|
conversion |
<kun ‘vR zhun> |
|
converson rate optimization (CRO) |
<kun ‘vR zhun RAt op tu mu ‘zA shun> <sE oR O> |
|
coordinate |
<kO ‘OR du nAt> <kO ‘OR di nut> |
|
core |
<kOR> |
|
create |
<kRE ‘At> |
|
CSS3 |
<sE es es thREE> |
|
custodian |
<kus ‘tO dE un> |
|
customer |
<‘kus tu mR> |
|
cyber |
<‘sI bR> |
|
data |
<‘da tu> <‘dA tu> |
|
data architecture |
<‘dA tu ‘oR ku tek chR> |
|
data loss prevention |
<‘dA tu Loss pRE ‘ven shun> |
|
data mining |
<‘dA tu ‘mI ning> |
|
data modeling |
<‘dA tu ‘mo du Ling> |
|
data owner |
<‘dA tu ‘O nR> |
|
data visualization |
<‘dA tu vi zhOOu Lu ‘zA shun> |
|
database |
<‘dA tu bAs> |
|
deal |
<dEL> |
|
declaration |
<de kLu ‘RA shun> |
|
decline |
<di ‘kLIn> |
|
demand |
<di ‘mand> |
|
design |
<di ‘zIn> |
|
designer |
<di ‘zI nR> |
|
detailed |
<‘dE tALd> |
|
determine |
<di ‘tR mun> |
|
developer |
<di ‘ve Lu pR> |
|
development |
<di ‘ve Lup munt> |
|
development operations (DEVOPS) |
<di ‘ve Lup munt O pR ‘A shunz> <‘dE vops> |
|
digital certificate |
<‘di ju tL sR ‘ti fu kut> |
|
digital data |
<‘di ju tL ‘dA tu> |
|
digital marketing |
<‘di ju tL ‘moR ku ting> |
|
digital signature |
<‘di ju tL ‘sig nu chR> |
|
disaster recovery plan (DRP) |
<di ‘za stR RE ‘ku vR E pLan> <dE oR pE> |
|
disclosure |
<dis ‘kLO zhR> |
|
discussion |
<di ‘sku shun> |
|
domain name system (DNS) |
<dO ‘mAn nAm ‘sis tum> <dE en es> |
|
downloading |
<‘doOOn LO ding> |
|
effectively |
<i ‘fek tiv LE> |
|
efficiency |
<i ‘fi shun sE> |
|
electronic |
<i Lek ‘tRo nik> |
|
electronic information communication and technology (EICT) |
<i Lek ‘tRo nik in fR ‘mA shun ku mEOO nu ‘kA shun and tek ‘no Lu jE> <E I sE tE> |
|
electronic mail (email) |
<i Lek ‘tRo nik mAL> <‘E mAL> |
|
electronic mail system |
<i Lek ‘tRo nik mAL ‘sis tum> |
|
electronic media |
<i Lek ‘tRo nik ‘mE dE u> |
|
elements |
<‘e Lu munts> |
|
email marketing |
<‘E mAL ‘moR ku ting> |
|
embedding |
<im ‘be ding> |
|
emergency change |
<i ‘mR jun sE chAnj> |
|
employ |
<im ‘pLOE> |
|
encrypted data |
<in ‘kRip tud ‘dA tu> |
|
encryption |
<in ‘kRip shun> |
|
end user |
<end ‘U zR> |
|
engagement |
<in ‘gAj munt> |
|
engineer |
<en ju ‘niR> |
|
engineering |
<en ju ‘niR ing> |
|
environment |
<in ‘vI Rn munt> |
|
equipment |
<i ‘kOOip munt> |
|
escrow |
<‘es kRO> |
|
expertise |
<eks pR ‘tEs> |
|
exposure |
<ik ‘spO zhr> |
|
eyestrain |
<‘I stRAn> |
|
finance |
<‘fI nans> |
|
financial |
<fu ‘nan shuL> |
|
firewall |
<‘fIR OOoL> |
|
firm |
<fRm> |
|
flash memory |
<fLash ‘mem RE> |
|
font |
<font> |
|
force |
<fORs> |
|
framework |
<‘fRAm OORk> |
|
front end development |
<fRunt end di ‘ve Lup munt> |
|
function |
<‘fung shun> |
|
goal |
<gOL> |
|
graduate |
<‘gRa ju OOut> <‘gRa ju OOAt> |
|
graphic design |
<‘gRa fik di ‘zIn> |
|
grid system |
<gRid ‘sis tum> |
|
growth hacking |
<gROth ‘ha king |
|
hardening |
<‘hoRd ning> |
|
hardware |
<‘hoRd OOeR> |
|
hybrid app |
<‘hI bRud app> |
|
hypertext markup language (HTML) |
<‘hI pR tekst ‘moR kup ‘Lang gOOij> <Ach tE em eL> |
|
identifier |
<I ‘den tu fI R> |
|
implementation |
<im pLu mun ‘tA shun> |
|
impressions |
<im ‘pRe shunz> |
|
incident |
<‘in su dunt> |
|
incident management |
<‘in su dunt ‘ma nij munt> |
|
influencer |
<‘in fLOO un sR> |
|
information custodian |
<in fR ‘mA shun kus ‘tO dE un> |
|
information owner |
<in fR ‘mA shun ‘O nR> |
|
information resources manager (IRM) |
<in fR ‘mA shun ‘RE sOR cuz ‘ma nu jir> <I oR em> |
|
information security |
<in fR ‘mA shun su ‘kER u tE> |
|
information security council |
<in fR ‘mA shun su ‘kER u tE ‘koOOn suL> |
|
information security officer (ISO) |
<in fR ‘mA shun su ‘kER u tE ‘o fu sR> <I es O> |
|
information security program |
<in fR ‘mA shun su ‘kER u tE ‘pRO gRam> |
|
information system |
<in fR ‘mA shun ‘sis tum> |
|
input device |
<‘in poot di ‘vIs> |
|
install |
<in ‘stoL |
|
institution |
<in stu ‘tOO shun> |
|
instruction |
<in ‘stRuk shun> |
|
insurance |
<in ‘shR uns> |
|
integrate |
<‘in tu gRAt> |
|
integrated development environment (IDE) |
<‘in tu gRA tid di ‘ve Lup munt in ‘vIRn munt> <I dE E> |
|
integrity |
<in ‘te gRu tE> |
|
intellectual property |
<in tu ‘Lek chu OOuL ‘pRo pR tE> |
|
internet |
<‘in tR net> |
|
intranet |
<‘in tRu net> |
|
introductory |
<in tRu ‘duk tR E> |
|
intrusion detection system (IDS) |
<in ‘tROO zhun di ‘tek shun ‘sis tum> <I dE es> |
|
involved |
<in ‘voLvd> |
|
kerning |
<‘kR ning> |
|
keyboard |
<‘kE bORd> |
|
keywords |
<‘kE OORdz> |
|
knowledge |
<‘no Lij> |
|
laboratory |
<‘La bRu tOR E> |
|
language |
<‘Lang gOOij> |
|
latest |
<‘LA tust> |
|
lawful intercept |
<‘Law fuL ‘in tR sept> |
|
lead |
<LEd> <Led> |
|
leadership |
<‘LE dR ship> |
|
leading |
<‘Le ding> <‘LE ding> |
|
level |
<‘Le vL> |
|
library |
<‘LI bReR E> |
|
load balancing |
<LOd ‘ba Lun sing> |
|
local account |
<‘LO kuL a ‘koOOnt> |
|
local area network (LAN) |
<‘LO kuL ‘e RE u ‘net OORk> <Lan> |
|
local storage |
<‘LO kuL ‘stOR ij> |
|
location |
<LO ‘kA shun> |
|
lowest |
<‘LO ust> |
|
maintain |
<mAn ‘tAn> |
|
maintenance |
<‘mAnt nuns> |
|
malicious code |
<mu ‘Li shus kOd> |
|
marketing |
<‘moR ku ting> |
|
marketing automation |
<‘moR ku ting aw tu ‘mA shun> |
|
mathematics |
<math ‘ma diks> |
|
matrix |
<‘mA tRiks> |
|
median |
<‘mE dE un> |
|
mentions |
<‘men shunz> |
|
meta elements |
<‘me tu ‘e Lu munts> |
|
microblogging |
<‘mI kRO bLo ging> |
|
mission critical information system |
<‘mi shun ‘kRi ti kuL in fR ‘mA shun ‘sis tum> |
|
mobile |
<‘mO buL> |
|
monitor |
<‘mo nu tR> |
|
mouse |
<moOOs> |
|
multichannel marketing |
<‘mul tE cha nL ‘moR ku ting> |
|
native apps |
<‘nA tiv apps> |
|
nature |
<‘nA chR> |
|
near field communication (NFC) |
<nER fELd ku mEOO nu ‘kA shun> <en ef sE> |
|
network |
<‘net OORk> |
|
networking |
<‘net OOR king> |
|
object-oriented programming (OOP) |
<‘ob jekt ‘OR E en tud ‘pRO gRa ming> <O O pE> |
|
office |
<‘o fus> |
|
officer |
<‘o fu sR> |
|
offshore |
<‘off shOR> |
|
offsite storage |
<‘off sIt ‘stOR ij> |
|
opening tags and closing tags |
<‘O pu ning tagz and ‘kLO zing tagz> |
|
operating system |
<‘o pR A ting ‘sis tum> |
|
order |
<‘OR dR> |
|
organic |
<OR ‘ga nik> |
|
organization |
<OR gun u ‘zA shun> |
|
output device |
<‘oOOt poot ‘di vIs> |
|
outsourcing |
<‘oOOt sOR sing> |
|
oversee |
<O vR ‘sEE> |
|
owner |
<‘O nR> |
|
padding |
<‘pa ding> |
|
parallel processing |
<‘peR u LeL ‘pRo se sing> |
|
password |
<‘pas OORd> |
|
password complexity |
<‘pas OORd kum ‘pLek su tE> |
|
password strength |
<‘pas OORd stRength> |
|
patch |
<pach> |
|
pdf |
<pE dE ef> |
|
penetration test |
<pe nu ‘tRA shun test> |
|
perform |
<pR ‘fORm> |
|
performance |
<pR ‘fOR muns> |
|
perimeter security control |
<pR ‘i mu tR si ‘kER u tE kun ‘tROL> |
|
period |
<‘piR E ud> |
|
personal identification number (PIN) |
<‘pR su nuL I den ti fi ‘kA shun ‘num bR> <pin> |
|
personally identifiable information |
<‘pR su nu LE I den tu ‘fI u bL in fR ‘mA shun> |
|
physical security |
<‘fi zi kL si ‘kER u tE> |
|
physical security control |
<‘fi zi kL si ‘kER u tE kun ‘tROL> |
|
pixels per inch (PPI) |
<‘pik suLz pR inch> <pE pE I> |
|
plaintext data |
<‘pLAn tekst ‘dA tu> |
|
plan |
<pLan> |
|
portable computing device |
<‘pOR tu bL kum ‘pEOO ting di ‘vIs> |
|
prevailing |
<pRi ‘vA Ling> |
|
problem |
<‘pRo bLum> |
|
process |
<‘pRo ses> |
|
product |
<‘pRo dukt> |
|
production system |
<pRu ‘duk shun ‘sis tum> |
|
program |
<‘pRO gRam> |
|
programmer |
<‘pRO gRa mR> |
|
project |
<‘pRo jekt> <pRu ‘jekt> |
|
projections |
<pRu ‘jek shuns> |
|
promoted |
<pRu ‘mO tud> |
|
property |
<‘pRo pR tE> |
|
prospect |
<‘pRo spekt> |
|
protected information |
<pRu ‘tek tid in fR ‘mA shun> |
|
provide |
<pRu ‘vId> |
|
publishing |
<‘pu bLi shing> |
|
random-access memory (RAM) |
<‘Ran dum ‘ak ses ‘me mR E> <Ram> |
|
rapid |
<‘Ra pud> |
|
raster images |
<‘Ra stR ‘i mi juz> |
|
reach |
<REch> |
|
reduce |
<Ri ‘dOOs> |
|
regina display |
<Re ‘jE nu dis ‘pLA> |
|
relational database management system (RDMS) |
<RE ‘LA shu nuL ‘dA tu bAs ‘ma nij munt ‘sis tum> <oR dE em es> |
|
relevant |
<‘Re Lu vunt> |
|
remote |
<Ri ‘mOt> |
|
removable media |
<RE ‘mOO vu bL ‘mE dE u> |
|
replace |
<Ri ‘pLAs> |
|
research |
<Ri ‘sRch> <‘RE sRch> |
|
residual risk |
<Ri ‘zi ju OOuL Risk> |
|
resolution |
<Re zu ‘LOO shun> |
|
resource |
<‘RE sORs> |
|
respond |
<Ri ‘spond> |
|
responsive web design |
<Ri ‘spon siv OOeb di ‘zIn> |
|
retina display |
<‘Re n nu dis ‘pLA> |
|
risk |
<Risk> |
|
risk assessment |
<Risk u ‘ses munt> |
|
risk management |
<Risk ‘ma nij munt> |
|
root access |
<ROOt ‘ak ses> |
|
rounded |
<‘RoOOn dud> |
|
routers |
<‘RoOO tRz> |
|
sales |
<sALz> |
|
sales funnel |
<sALz ‘fu nuL> |
|
scheduled change |
<‘ske jOO uLd chAnj> |
|
scheduled outage |
<‘ske jOO uLd ‘oOO tij> |
|
science |
<‘sI uns> |
|
scientific |
<sI un ti fik> |
|
scientist |
<‘sI un tist> |
|
search engine marketing (SEM) |
<sRch ‘en jun ‘moR ku ting> <es E em> |
|
search engine optimization (SEO) |
<sRch ‘en jun op tu mu ‘zA shun> <es E O> |
|
section |
<‘sek shun> |
|
security |
<si ‘kER u tE> |
|
security administrator |
<si ‘kER u tE ud ‘mi nu stRA dR> |
|
security incident |
<si ‘kER u tE ‘in su dunt> |
|
security incident management |
<si ‘kER u tE ‘in su dunt ‘ma nij munt> |
|
selector |
<si ‘Lek tR> |
|
self-closing tag |
<seLf ‘kLO zing tag> |
|
semantic elements |
<si ‘man tik ‘e Lu munts> |
|
semi-structured data |
<‘se mE ‘stRuk chRd ‘dA tu> |
|
sensitive information |
<‘sen su tiv in fR ‘mA shun> |
|
serif |
<‘seR uf> |
|
server |
<‘sR vR> |
|
service |
<‘sR vus> |
|
simultaneously |
<sI muL ‘tA nE us LE> |
|
single sign-on |
<‘sing guL ‘sI non> |
|
site |
<sIt> |
|
sitemap |
<sI map> |
|
social graph |
<‘sO shL gRaf> |
|
social media |
<‘sO shL ‘mE dE u> |
|
software |
<‘soft OOAR> |
|
software development kit (SDK) |
<‘soft OOAR di ‘ve Lup munt kit> <es dE kA> |
|
software development kit (SDK) |
<‘soft OOAR di ‘ve Lup munt kit> <es dE kA> |
|
sophisticated |
<su ‘fi stu KA tud> |
|
specialist |
<‘spe shu List> |
|
specialized |
<‘spe shu LIzd> |
|
specific |
<spu ‘si fik> |
|
spend |
<spend> |
|
spyware |
<‘spI OOAR> |
|
staff |
<staff> |
|
statistic |
<stu ‘ti stik> |
|
strong password |
<stRong ‘pass OOrd> |
|
structural elements |
<‘stRuk chu RuL ‘e Lu munts> |
|
substantial |
<sub ‘stan shuL> |
|
sufficient |
<su ‘fi shunt> |
|
support |
<su ‘pORt> |
|
synchronization |
<sing kRu nu ‘zA shun> |
|
syndrome |
<‘sin dROm> |
|
system |
<‘sis tum> |
|
system administrator |
<‘sis tum ud ‘mi nu stRA tR> |
|
system hardening |
<‘sis tum ‘hoRd ning> |
|
task |
<task> |
|
technical |
<‘tek ni kuL> |
|
technician |
<tek ‘ni shun> |
|
technological |
<tek nu ‘Lo ji kuL> |
|
technology |
<tek ‘no Lu jE> |
|
telecommunications |
<te Li ku mEOO nu ‘kA shunz> |
|
test and development systems |
<test an di ‘ve Lup munt ‘sis tumz> |
|
text editor |
<tekst ‘e du tR> |
|
title |
<‘tI tL> |
|
tool |
<tOOL> |
|
tracking |
<‘tRa king> |
|
traffic |
<‘tRa fik> |
|
training |
<‘tRA ning> |
|
transfer |
<‘trans fR> |
|
trojan |
<‘tRO jun> |
|
type hierarchy |
<tIp ‘hI R oR kE> |
|
typeface |
<‘tIp fAs> |
|
typography |
<tI ‘po gRu fE> |
|
unauthorized disclosure |
<un ‘aw thR Izd dis ‘kLO zhR> |
|
uncommon |
<un ‘ko mun> |
|
understanding |
<un dR ‘stan ding> |
|
uninterruptible power supply (UPS) |
<un in tR ‘Rup tu bL ‘poOO R su ‘pLI> <U pE es> |
|
unscheduled outage |
<un ‘ske jOOuLd ‘oOO tij> |
|
unscheduled change |
<un ‘ske jOOLd chAnj> |
|
uploading |
<‘up LO ding> |
|
uptime and downtime |
<‘up tIm and ‘doOOn tIm> |
|
use/using |
<Uz ‘U zing> |
|
user |
<‘U zR> |
|
user experience (UX) |
<‘U zR ik ‘spiR E uns> <U eks> |
|
user flow |
<‘U zR fLO> |
|
user interface (UI) |
<‘U zR ‘in tR fAs> <EOO I> |
|
user persona |
<‘U zR pR ‘sO nu> |
|
user research |
<‘U zR ‘RE sRch> |
|
user-generated content (UGC) |
<‘U zR je nR A tud ‘kon tent> <U jE sE> |
|
username |
<‘U zR nAm> |
|
value |
<‘vaL EOO> |
|
variety |
<vu ‘RI u tE> |
|
vector images |
<‘vek tR ‘i mi juz> |
|
vendor |
<‘ven dR> |
|
version control |
<‘vR zhun kun ‘tROL> |
|
virtual machine (VM) |
<‘vR chu OOuL mu ‘shEn> <vE em> |
|
virtual private network (VPN) |
<‘vR chu OOuL ‘pRI vut ‘net OORk> <vE pE en> |
|
virus |
<‘vI Rus> |
|
volatile memory |
<‘vo Lu tL ‘mem RE> |
|
volume |
<‘voL EOOm> |
|
vulnerability |
<vuL nu Ru ‘bi Lu tE> |
|
web |
<OOeb> |
|
web apps |
<OOeb aps> |
|
web page |
<OOeb pAj> |
|
web servers |
<OOeb ‘sR vRz> |
|
webmaster |
<‘OOeb ma stR> |
|
website optimization |
<‘OOeb sIt op tu mu ‘zA shun> |
|
whiteboarding |
<‘OOIt bOR ding> |
|
wireframe |
<‘OOIR fRAm> |
|
Wireless |
<‘OOIR Lus> |
|
wireless adhoc networking |
<‘OOIR Lus ‘ad hok ‘ne OOR king> |
|
wireless networking |
<‘OOIR Lus ‘ne OOR king> |
|
worker |
<‘OOR kR> |
|
workplace |
<‘OORk pLAs> |
|
world wide web |
<OORLd OOId OOeb> |
|
worm |
<OORm> |
|