top of page
computer technology

SC SBDC CyberSecurity Glossary

Cybersecurity – The effort and resources put in use to protect a business from criminal or unauthorized use of digital assets.
 

DoD (Department of Defense) – The government entity currently driving minimal cybersecurity measures in order to conduct business within their contracts.


Encryption – The process of converting human legible data into complex computer code to prevent unauthorized access.


Firewall – A hardware or software device used to monitor network traffic and prevent unwanted content.
 

Forensics – Scientific tests or techniques used to detect and/or investigate the cause of a crime.
 

Hardware – Equipment associated with conducting digital work such as laptops, computers, mobile devices and networking devices.
 

HIPAA (Health Insurance Portability and Accountability Act) – Law that outlines the requirements to maintain the privacy of medical and health records.
 

Host – The computer or internet service providing the digital space to hold data, files and software for daily operations. Common hosts might include GoDaddy, Amazon, HostGator, BlueHost, etc.
 

IoT (Internet of Thinks) – Commonly refers to any device other than a traditional computer that is connected and able to communicate over the internet. Examples may be, cameras and security systems, manufacturing equipment or household thermostats.
 

IP (Intellectual Property) – An original creation such as an invention, literary or artistic work whether tangible or digital in form.
 

Intrusion Detection – In the context of cybersecurity, normally software or hardware set up to note unwanted or unusual digital traffic or by physical access.
 

Malware – Software designed to disrupt, damage or gain unauthorized access to digital systems.
 

NIST or NIST Framework – National Institute of Standards and Technology guidelines for security measures to help prevent, detect and respond to cyber attacks.
 

PCI (Payment Card  Industy) Compliance  – Standards in place to secure and protect credit card data as it is exchanged.
 

Permissions – The level of access granted a person using network or computing device. Normally limits the data that can be seen or the software functions allowed.
 

PII (Personal Identity Information) – Information that directly and specifically identifies an individual. Examples may include: name, address, social security number, employee number, phone number, etc.)
 

Server – Usually the primary location for all software and data within a networked computer system. There may be one or several servers in any network.
 

Social Media – Websites that allow users to create and share content while networking with friends and peers.
 

Software – Programs or instructions used by computers to conduct the tasks requested by users.
 

URL (Universal Resource Locator) – Web page address. Example: SCSBDC.com
 

Virus – Malware capable of copying itself across one or more computer networks with the intent to do harm.


VPN (Virtual Private Network) – A software solution that provides an encrypted, secure access to remote devices across the internet.


Wi-Fi –    Short range wireless connection between two devices over the internet.

Cybersecurity Consultants


Earl Gregorich - Team Lead
Greenville Area Manager

egrego5@clemson.edu

Brent Hoover
Aiken Business Consultant
brentho@usca.edu

Scott Bellows

Midlands Procurement Consultant

shbellows@sc.edu

Beth Smith

Columbia Business Consultant

smithem6@sc.edu

Sherry Pittinger

Anderson Procurement Consultant

spittin@clemson.edu

Other Information:

Cybersecurity Services, Team

Small Business Cyber Security Guide & Training Workbook

 

Small Business Cybersecurity Self Assessment

 

Glossary of Cybersecurity Terms

 

Cybersecurity Video Library

FAQ - Cybersecurity Questions

bottom of page