Glossary

Welcome to the Glossary! Whether you're already familiar with some of these terms or you're just becoming acquainted, our top-level glossary is a great resource for learning all of the relevant goods. Scroll through the full list below, search by term, or select by individual letter.
SHOW ALL A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Batch File

A type of script that contains a list of commands. These commands are executed in sequence and can be used to automate processes.

Blockchain

A ledger or chain of information that retails a detailed history of digital transactions. They are meant to help protect against counterfeiting and to safeguard digital transactions.

Bot

A computer or system that has been compromised and is undetected. The computer can be controlled directly by a bot master or herder for the purpose of spamming or launching a DDoS attack. It may also have been programmed to perform certain actions when interfacing with human input or websites.

Box

A cloud content management and file sharing service for businesses. It is available as a GoAnywhere Cloud Connector. 

CCC

Short for Clear Command Channel. The CCC command makes a secured control/command channel revert back to plaintext (unsecured). It helps to solve data connection problems.

CDN

A CDN, or Content Delivery Network, refers to a geographically distributed group of servers which work together to provide fast delivery of internet content.

CDR

Stands for Content Disarm and Reconstruction. CDR is an advanced threat prevention technology that does not rely on detection. Instead, it assumes all files are malicious, so it sanitizes and rebuilds each file ensuring full usability and safe content.

Certificate Authority

An entity that issues digital certificates, the highest level of trust.

Checksum

A checksum is a sequence of numbers and letters used to check for errors that may have been introduced during transmission or storage. By themselves, checksums are often used to verify data integrity, but are not relied upon to verify data authenticity.

CICA

Short for Context Inspired Component Architecture. It is ASC X12’s message-design methodology, created to help resolve costly, differing, and often incompatible XML messages used for B2B (Business-to-Business) data exchange. 

CIFS

Stands for Common Internet File System. It is a dialect of SMB. 

Ciphertext

The result of encryption performed on plaintext using an algorithm, known as a cipher. 

Cloud Computing

This refers to applications and services offered over the internet. They are essentially data centers, collectively referred to as "the cloud." Cloud computing uses a network of remote servers hosted on the internet to store, manage, and process data, rather than a local server or a personal computer. Cloud Computing services falls into four categories: IaaS, FaaS, PaaS, and SaaS.

Cloud File Transfer

Transferring or syncing files securely from one cloud service directly to another. 

Cloud Intergrations

Cloud integrations, or cloud connectors, are built-in web and cloud application integrations that connect to your GoAnywhere MFT projects and workflows.

Clustering

Using two or more computer systems that work together. Typically, this refers to multiple servers that are linked together in order to handle varying workloads or to provide continued operation in case one fails.

Compliance

This indicates that a vendor successfully recognizes a particular standard and encompass most, if not all, of that key standard.

Compression

A way to improve transmission time by shrinking the size of messages.

Cryptocurrency

Cryptocurrency is a digital currency that can be used to buy goods and services. It uses an online ledger with strong cryptography to secure online transactions.

Cryptography

The science of protecting information by transforming it into a secure format.

Cryptojacking

Cryptojacking is an online threat with the main purpose of stealing or \"mining\" cryptocurrencies.

CSE

Short for the Canadian Communication Security Establishment. It is one of Canada’s key security and intelligence organizations. They are responsible for protecting Canadian government electronic information and communication networks, among other duties.

CSR

Short for Certificate Signing Requests. It is a block of encoded text that is given to a Certificate Authority when applying for an SSL Certificate.

CSV (file)

Stands for Comma-Separated Values. A CSV file is a delimited text file that uses a literal comma to separate files. 

DAR

Short for Data at Rest. DAR refers to inactive data that is stored physically in any digital form, such as databases, spreadsheets, archives, mobile devices, and more. It is subject to threats from hackers and other malicious threats.

Data Classification

Data classification is the act of organizing data by relevant categories so that it may be used and protected more efficiently.

Data in Transit

Data in Transit, also known as Data in Motion or Data in Flight, is used to describe data that is in transit from one location to another through networks (cellular, Wi-Fi, private, etc.). The term is often used in laws and regulations to define another key state where data must be secured.

Data Key

A key which holds a variable value. It can be applied to a string or a text block in order for it to be encrypted or decrypted. 

Data Mining

Data Mining is a process of discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems.

Data Security

Data security is the practice of identifying and protecting sensitive data, and ensuring it remains secure throughout its lifecycle.

DB2

A family of database management system products from IBM that serve a number of different operating system platforms.

DBMS

Stands for Database Management System. It is a collection of programs that enables you to store, modify, and extract information from a database.

DCI

Short for Deep Content Inspection. DCI is a form of network filtering that can examine an entire file of MIME object as it passes an inspection point. It can search for viruses, spam, data loss, key words, or other content level criteria.

DDoS

DDoS, short for a Distributed Denial-of-Service is an attack or malicious attempt to disrupt the normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of internet traffic.

Decryption

The process of taking encoded or encrypted text or other data and converting it back into a text that you or the computer can read and understand.