Graphical design of cloud with information technology icons to explain information technology cloud terminology

Cloud Computing Terminology

What is Cloud Computing ?

Cloud Computing is the delivery of I T Information Technology resources ( hardware : computing, storing, networking & software : operating systems, middleware, virtualization, applications ) on demand over the internet with pay-as-you- go pricing model. Cloud computing services offers flexibility, scaling, support and is highly cost effective versus buying, upgrading, self managing I T resources.

Is Internet Cloud ?

No. Internet is communications network inter-connected to many computer networks around the world.

What is Cloud ?

Cloud is network of computer networks & comunication networks.

AI :

A Record :

Algorithm :

Analytics :

AntiVirus :

Apache :

APT :

Applications :

Application Allowlisting :

Application Migration :

Application Modernization :

Application Security :

AST :

Authentication :

Authorization :

Automation :

Availability Zone :

API :

Bare Metal Server :

Bit :

Byte :

Bandwidth :

Big Data :

Block Chain :

Backup :

Back End :

Botnets :

Business Intelligence :

Cache :

Client :

Cloud Automation :

Cloud as a Service :

Cloud Bursting :

Cloud Elasticity :

Cloud Hypervisor :

Cloud Infrastructure :

Cloud Migration :

Cloud Ops :

Cloud Repatriation :

Cloud Access Security Broker :

Cloud Security :

C Panel :

Cross Cloud :

cc TLD :

Command & Control Communications :

Control Panel :

CPU :

CDN :

C Name :

CI/CD :

Cybersecurity :

Container :

Container Run Time :

Co-Location :

Cluster :

CWE :

DAST :

Dashboard :

Database Sharding :

Data Portability :

Data Exfiltration :

Data Loss Prevention :

Disk Space :

Domain :

Domain Parking :

Domain Auction :

Database :

Downtime :

Developer :

DevOps :

DevSecOps

Data Centre :

DDOS :

DNS :

Dedicated Server :

Decrypt :

Disaster Recovery :

Distributed Computing :

Distributed Cloud :

Docker :

Edge Computing :

Edge Cloud :

Encrypt :

Ethernet :

Ethical Hacking :

End Point Security :

Enterprise Security :

Fault Tolerance :

Federated Network :

Firewall :

Flow Network Security :

Front End :

Gateway :

Geo Affinity :

Geo-Redundancy :

Grid Computing :

Hacking :

Hadoop :

Hop :

Hosting :

Hub :

Hybrid Cloud :

Hybrid VDI :

Hyper Convergence :

HTTPS :

I T Infrastructure :

IoT :

ISP :

IP Address :

Internet :

Internet Exchange Point :

Intranet :

IaaS :

ICANN :

IEEE :

Intrusion Protection Systems :

IOPS :

Kubernetes :

Latency :

Lift & Shift :

LAN :

Load Balancing :

Machine Learning :

Machine Learning :

Malware :

Mail Server :

Metadata :

Micro-segmentation :

Middleware :

Mirroring :

Multi Cloud :

MX Record :

Name Servers :

Natural Language Processing :

Networking :

Network Access Control :

Network Management Software :

Network Security :

Neural Networks :

NOC :

Operating System :

Optical Cables :

Optical Transceivers ;

On Demand :

On Premise :

Open-Source :

OWASP :

Pay-as-you-go :

PaaS :

Perimeter Firewall :

Plesk :

Phishing :

Private Cloud :

Privacy Protection :

Proxy :

Public Cloud :

Quantum Computing :

Qubit :

RAM :

Ransomware :

Real Time :

ROM :

Root Access :

Router :

RunTime Environment :

SAST :

SD-WAN :

Self Detecting :

Self Healing :

Self Configuring :

Server :

Service Provider :

Security Threat :

Session Optimization :

Serverless :

SOA :

Software Defined Data Centre :

Storage :

Shared Hosting :

SaaS :

Scaling :

SLA :

Stack :

Scanning :

Shared Fate :

Switch :

SSD :

SSL :

SSH :

Subdomain :

Subnet :

Thin Client :

Threat Actors :

Throughput :

TLD :

TTL :

TXT Record :

UI :

Unified Threat Management :

URL :

UX :

Uptime :

Updates :

VPN :

VPS :

Vendor Lock In :

Virtual Machine :

Virtual Private Cloud :

Virtualization :

Vulnerabilty Management :

WAF :

WAN :

Website :

WWW :

Wi-Fi :

Wireless Networks :

Work Load Security :

Yottabyte :

Zero Trust Network Access :