Glossary

95th Percentile – a pricing method for billing bandwidth usage.  Traffic levels are monitored every 5 minutes at the end of the reporting period (monthly usually) the top 5% inbound and outbound traffic is disregarded and the remaining data is 95th percentile value.

SC – System Configuration – Defines the computers, processes, and devices that compose the system and its boundary. More general the system configuration is the specific definition of the elements that define and/or prescribe what a system is composed of. Configuration can refer to either hardware or software or the combination of both.

Broadband – a high-capacity transmission technique using a wide range of frequencies, which enables a large number of messages to be communicated simultaneously.

Router – A device that is used to connect two or more computers or devices to each other and usually to the internet, via wired cables, or through a wireless signal. This allows several computers to connect to each other and to the internet at the same time

Fibre Connection – use of plastic or glass cables, which allow for faster data transfer compared to the standard copper wires which are used in regular broadband connections.

Bandwidth – a range of frequencies within a given band, in particular that used for transmitting a signal.

Firewall – a security device that can be a software program or a dedicated network appliance. The main purpose of a firewall is to separate a secure area from a less secure area and to control communications between the two.

Mbps – Millions of bits per second or megabits per second. A measure of bandwidth (the total information flow over a given time) on a telecommunications medium.

DSL Lines – Digital Subscriber Lines – Packing Data onto copper wires

ADSL – Asymmetric Digital Subscriber Line – Type of DSL broadband used for connecting to the internet. Allows more data to be sent over existing copper lines compared to traditional modern lines.

ADSL+2 – ADSL2 and ADSL2+ use the same cabling and exchange infrastructure as a regular ADSL connection. However, the software that makes the technology possible allows for greater amounts of data to be transmitted, which means that it can reach speeds of up to 3x regular ADSL ñ 24Mbps download and 1Mbps upload.

FTTC – Fibre to the Cabinet – It’s one of two ways in which next-gen fibre optic broadband is being delivered to homes and businesses in the UK. FTTC in a nutshell is much easier and cheaper to deliver en masse than its counterpart, FTTP or Fibre to the Premises (sometimes called FTTH or Fibre to the Home).

FTTP – Fibre to the Premise.

Ethernet – a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems

EFM – Ethernet in the First Mile . Provides a high-quality alternative to traditional leased lines. Offering bandwidths between 2Mbps and 20Mbps, EFM is a scalable Ethernet service with dedicated connectivity and guaranteed service levels at a fraction of the cost of a legacy Leased Line service.

Leased Lines – a dedicated connection that allows for communication between two sites (a point-to-point leased line) or between a site and the Internet (an internet leased line). Leased lines typically deliver bandwidth over a leased fibre connection, although copper local tails can sometimes be used as well.

MPLS – Multiprotocol Label Switching. A mechanism in high-performance telecommunications networks that directs data from one network node to the next based on short path labels rather than long network addresses, avoiding complex lookups in a routing table.

VPN – Virtual Private Network. Connects components to one network by using another network, such as the Internet. Virtual private networks do this by “tunnelling” through the Internet or another public network in a manner that provides the same security and features as a private network.

PCI – Payment Card Industry

PCI DSS – Payment Card Industry Data Security Standard. A proprietary information security standard for organizations that handle branded credit cards from the major card schemes including Visa, MasterCard, American Express, Discover, and JCB.

XCS – Extensible Content Security. Offers defence from email and web based threats including Spam, Virus’s, Malware, Filtering, Blended Threats, Spyware and network attacks. (WatchGuard)

XTM – Extensible Threat Management – Network security appliances. (WatchGuard)

Spam – irrelevant or unsolicited messages sent over the Internet, typically to large numbers of users, for the purposes of advertising, phishing, spreading malware, etc.

Viruses – a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.

Malware – software which is specifically designed to disrupt or damage a computer system. (Malicious programs). Examples are bugs, viruses, worms etc.

Filtering – in signal processing, a filter is a device or process that removes from a signal some unwanted component or feature. Filtering is a class of signal processing, the defining feature of filters being the complete or partial suppression of some aspect of the signal

Spyware – software that enables a user to obtain covert information about another’s computer activities by transmitting data covertly from their hard drive.

Terminal Services – software is installed only once on a server rather than on every desktop.

RPO – Recovery Point Objective – The tolerance limit for recovery after disruption.

RTO – Recovery Time Objective – Time to recover after notification of disruption.

2FA – Two Factor Authentication – an additional layer of security.  So in addition to a user name and password you have to enter a piece of information only you have.