Glossar

Glossary

Rohde & Schwarz Cybersecurity has put together a glossary of the most important terms related to network, application and endpoint security. It also refers to some aspects of digitization, IT security, compliance and data protection in general.

Item Meaning
APT attacks Advanced persistent threats (APT) aim at large-scale infection of computers, spread of malware, theft of login credentials or the formation of a botnet (see 3. Botnet).
Backdoors Backdoors are access points included by software developers to circumvent security features, in case system access is required.
Botnet A botnet is a remotely controlled network of several thousand computers, tablets or mobile devices that are misused to shut down websites by way of distributed denial-of-service (see 12. DDoS) attacks. Botnets are also used to send spam emails or steal data and are sometimes rented out to third parties.
Data security Encompasses all information protected by data protection laws, plus sensitive data such as corporate secrets and information related to development and research.
Data protection Includes protection of personal information that either directly identifies or allows for identification of a person. Since May 2018, it is governed by the European General Data Protection Regulation in order to improve consumer protection.
Digital fingerprint Also called the hash value of a cryptographic hash function, it describes a checksum that allows the immediate validation of a data set.
Digital certificate Data set that includes information such as names, additional records and a signature of a person, group or system.
Digitization Conversion of analog to computerized processing and the increased usage of computers in general.
Digital signature Checksum proving the identity of a person and the integrity of information, created through a private key.
Digital transformation Digitization of work processes and the required strategic preparation and planning.
Distributed denial-of-service (DDoS) Programmed and scheduled attacks on internet services, intended to overload the server and cause a downtime. Most commonly executed by botnets massively targeting net components or servers.
Malware Malicious software that is designed to prevent and disrupt the use of computers and data (see 13. Ransomware).
Ransomware Malware that encrypts data or denies access to computers with the intention of extorting a ransom. A distinction is made between two different kinds of ransomware: file-encrypting ransomware that encrypts data on a computer, and screen-locking ransomware that locks the screen and prevents access to data and the system. Ransomware can target any operating system, but Windows-based systems are currently the most common target.
Real-time Input, transfer and output of data between devices without delay of transmission.

Request information

Do you have questions or need additional information? Simply fill out this form and we will get right back to you.

Marketing permission

I want to receive information from Rohde & Schwarz via

What does this mean in detail?

I agree that Rohde & Schwarz GmbH & Co. KG and the Rohde & Schwarz entity or subsidiary company mentioned in the imprint of this website, may contact me via the chosen channel (email or postal mail) for marketing and advertising purposes (e.g. information on special offers and discount promotions) related to, but not limited to, products and solutions in the fields of test and measurement, secure communications, monitoring and network testing, broadcast and media, and cybersecurity.

Your rights

This declaration of consent may be withdrawn at any time by sending an email with the subject "Unsubscribe" to news@rohde-schwarz.com. Additionally, a link to unsubscribe from future email advertisements is contained in each email sent. Further details on the use of personal data and the withdrawal procedure are set out in the Statement of Privacy.

Your request has been sent successfully. We will contact you shortly.
An error is occurred, please try it again later.