IT Glossary Highlighted Vers.
IT Glossary Highlighted Vers.
Access Rights: The permissions and controls governing who has access to certain information or
systems, particularly relevant in IT and cyberspace.
AI and Expert Systems: is an umbrella term that encompasses numerous methods for building intelligent
computers
Antivirus: Programs designed to detect and delete any malware such as software viruses.
Application Security the processes, practices, and tools used to identify, repair and protect against
vulnerabilities in applications throughout the software development life cycle.
Artificial Intelligence Branch of computer science focused with making computer work and act like
humans
Assistive Media Software or hardware which aid people with less abilities in accessing computers
Authentication: The process of determining whether someone or something is, in fact, who or
what it says it is.
Cloud Computing The process of storing and accessing data and programs over the internet instead
of your computer’s hard drive.
Code of Ethics: A set of principles designed to guide decision-making and distinguish right from
wrong within a business or organization.
Computer
Programmer: Someone who writes new computer software using coding languages to
troubleshoot and improve software, including video game software.
Confidentiality
Privacy: The invasion of our privacy is now much simpler and potentially riskier than it was
before the invention of the computer. It can be employed symbolically to coerce,
trick, or steal from victims
Copyright: The exclusive legal right to reproduce, publish, sell, or distribute the content and
form of literary, musical, or artistic works.
Data Control: refers to the ability to manage and secure data, ensuring that it is used responsibly
and ethically.
Database Administrator: A specialist who uses specialized software to organize and manage data,
diagnosing and solving complex IT issues related to data infrastructure.
DICT Spearheads the nation’s ICT use for economic growth and public service
E-learning providing electronic content to the learner on the most accessible routes
and using modern electronic media such as computers.
Electronic Surveillance: This one involves monitoring and recording people with technology, often
without their knowledge.
Encryption Security a technique that transforms data into an unreadable format using a
mathematical algorithm and a cryptographic key.
Encryption: A way of scrambling data so that only authorized partes can understand
the information.
Firewall a type of network security where it inspects incoming and outgoing traffic
using a set of security rules to identify and block threats.
Fixed-line Network: Used for voice and data communications through a cable
Fraud and Misuse: A scheme by one individual, group, or organization that leads another to
part with valuables or give up a legal right
IT Laws: regulations that govern the use, access, and dissemination of information
in the digital realm.
Local Area Network LAN: system where computers and other devices connect to each other in one
location.
Logging: Stores data of who has access to the data and how it was accessed.
Metropolitan Area Network MAN interconnection of several LANs throughout a city, town or
municipality
Mobile Applications: software applications created specifically for use on small, wireless
computing devices like smartphones and tablets.
Multifactor Authentication Code: an authentication method that requires the user to provide two
or more verification factors to gain access to a resource.
National Privacy Commission NPC: enforces these regulations and prescribes penalties for violations
Network: a set of devices that are connected and linked together through
communication links.
Personal Privacy: The protection of personal spaces and the ability to control
access to one's own information.
Quality Assurance Tester: Technicians or engineers who test software products to ensure
they meet industry standards and are free of issues, commonly
found in gaming and mobile application development.
RA 10173 Data Privacy Act of 2012: An act protecting individual personal information in information
and communications systems in the government and the private
sector. It regulates the protection of personal data and privacy
rights.
RA 10175 Cybercrime Prevention Act: enforces these regulations and prescribes penalties for violations
RA 11934 Subscriber Identity Module (SIM) Registration Act: It aims to prevent and deter criminal
activities involving mobile
communications while ensuring that
legitimate users can continue to enjoy
the benefits of mobile services
RA 4200 Anti Wire Tapping Act: an act to prohibit and penalize wire-
tapping and other related violations of
the privacy of communication, and for
other purpose
RA 8293 Intellectual Property Code of the Philippines: An act prescribing the intellectual
property code and establishing the
intellectual property office, providing for
its powers and functions, and for other
purposes. It governs intellectual
property rights in the Philippines and
provides legal protection and regulations
for various forms of intellectual
property.
RA 8484 Access Devices Regulation Act: an act regulating the issuance and use of access devices,
prohibiting fraudulent acts committed relative thereto,
providing penalties and for other purposes
RA 8792 E-Commerce Act of 2002: an act providing for the recognition and use of electronic
commercial and non-commercial transactions and
documents, penalties for unlawful use thereof, and for
other purposes
RA 9239 Optical Media Act: an act regulating optical media, reorganizing for this
purpose the videogram regulatory board, providing
penalties therefor, and for other purposes"
RA 9775 Anti-Child Pornography Act of 2009: an act defining the crime of child pornography,
prescribing penalties therefor and for other purposes
RA 9995 Anti-photo and Video Voyeurism Act: an act defining and penalizing the crime of photo and
video voyeurism, prescribing penalties therefor, and for
other purposes
Trade Secrets: Practices or processes of a company that are not generally known
outside the company and provide a competitive advantage.
User’s intervention: refers to the actions and activities that individuals take within a
networked environment.
Virtual Private network VPN: creates a private network overlay across an existing public
network.
Social Media: Websites, application or online channel that enables web user to
create, discuss, modify and exchange user-generated content
Wired Network: refers to any physical medium connected through wires and
cables that provides high security with high bandwidth
provisioned for each user
Wireless Local Area Network: utilizes a wider distribution method to connect two or more
devices, which provides access points to a wider internet.
Wireless Network: Computer networks that are not connected by any cables; utilizes
radio waves to transmit signals
Wireless personal area network: Allows users to connect devices in a short amount of time,
generally within a person's reach.