Glossary
Batch File
A type of script that contains a list of commands. These commands are executed in sequence and can be used to automate processes.
Blockchain
A ledger or chain of information that retails a detailed history of digital transactions. They are meant to help protect against counterfeiting and to safeguard digital transactions.
Bot
A computer or system that has been compromised and is undetected. The computer can be controlled directly by a bot master or herder for the purpose of spamming or launching a DDoS attack. It may also have been programmed to perform certain actions when interfacing with human input or websites.
Box
A cloud content management and file sharing service for businesses. It is available as a GoAnywhere Cloud Connector.
CCC
Short for Clear Command Channel. The CCC command makes a secured control/command channel revert back to plaintext (unsecured). It helps to solve data connection problems.
CDN
A CDN, or Content Delivery Network, refers to a geographically distributed group of servers which work together to provide fast delivery of internet content.
CDR
Stands for Content Disarm and Reconstruction. CDR is an advanced threat prevention technology that does not rely on detection. Instead, it assumes all files are malicious, so it sanitizes and rebuilds each file ensuring full usability and safe content.
Certificate Authority
An entity that issues digital certificates, the highest level of trust.
Checksum
A checksum is a sequence of numbers and letters used to check for errors that may have been introduced during transmission or storage. By themselves, checksums are often used to verify data integrity, but are not relied upon to verify data authenticity.
CICA
Short for Context Inspired Component Architecture. It is ASC X12’s message-design methodology, created to help resolve costly, differing, and often incompatible XML messages used for B2B (Business-to-Business) data exchange.
CIFS
Stands for Common Internet File System. It is a dialect of SMB.
Ciphertext
The result of encryption performed on plaintext using an algorithm, known as a cipher.
Cloud Computing
This refers to applications and services offered over the internet. They are essentially data centers, collectively referred to as "the cloud." Cloud computing uses a network of remote servers hosted on the internet to store, manage, and process data, rather than a local server or a personal computer. Cloud Computing services falls into four categories: IaaS, FaaS, PaaS, and SaaS.
Cloud File Transfer
Transferring or syncing files securely from one cloud service directly to another.
Cloud Intergrations
Cloud integrations, or cloud connectors, are built-in web and cloud application integrations that connect to your GoAnywhere MFT projects and workflows.
Clustering
Using two or more computer systems that work together. Typically, this refers to multiple servers that are linked together in order to handle varying workloads or to provide continued operation in case one fails.
Compliance
This indicates that a vendor successfully recognizes a particular standard and encompass most, if not all, of that key standard.
Compression
A way to improve transmission time by shrinking the size of messages.
Cryptocurrency
Cryptocurrency is a digital currency that can be used to buy goods and services. It uses an online ledger with strong cryptography to secure online transactions.
Cryptography
The science of protecting information by transforming it into a secure format.
Cryptojacking
Cryptojacking is an online threat with the main purpose of stealing or \"mining\" cryptocurrencies.
CSE
Short for the Canadian Communication Security Establishment. It is one of Canada’s key security and intelligence organizations. They are responsible for protecting Canadian government electronic information and communication networks, among other duties.
CSR
Short for Certificate Signing Requests. It is a block of encoded text that is given to a Certificate Authority when applying for an SSL Certificate.
CSV (file)
Stands for Comma-Separated Values. A CSV file is a delimited text file that uses a literal comma to separate files.
Cybersecurity
Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks aiming to cause harm.
DAR
Short for Data at Rest. DAR refers to inactive data that is stored physically in any digital form, such as databases, spreadsheets, archives, mobile devices, and more. It is subject to threats from hackers and other malicious threats.
Data Classification
Data classification is the act of organizing data by relevant categories so that it may be used and protected more efficiently.
Data in Transit
Data in Transit, also known as Data in Motion or Data in Flight, is used to describe data that is in transit from one location to another through networks (cellular, Wi-Fi, private, etc.). The term is often used in laws and regulations to define another key state where data must be secured.
Data Key
A key which holds a variable value. It can be applied to a string or a text block in order for it to be encrypted or decrypted.
Data Mining
Data Mining is a process of discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems.
Data Security
Data security is the practice of identifying and protecting sensitive data, and ensuring it remains secure throughout its lifecycle.
DB2
A family of database management system products from IBM that serve a number of different operating system platforms.
DBMS
Stands for Database Management System. It is a collection of programs that enables you to store, modify, and extract information from a database.
DCI
Short for Deep Content Inspection. DCI is a form of network filtering that can examine an entire file of MIME object as it passes an inspection point. It can search for viruses, spam, data loss, key words, or other content level criteria.
DDoS
DDoS, short for a Distributed Denial-of-Service is an attack or malicious attempt to disrupt the normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of internet traffic.
Decryption
The process of taking encoded or encrypted text or other data and converting it back into a text that you or the computer can read and understand.
Pagination
- Previous page
- Page 2
- Next page