Small Business, Big Threat: Assessment Definitions:

Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8

Keywords (All Chapters):

Admin: The system administrator account, usually reserved for IT to do maintenance and install new programs.
Anti-Malware: A piece of software that tries to remove unwanted software and programs that are usually installed by viruses.
Anti-Virus: A piece of software that prevents your computer from being exploited by looking for patterns in created files, running programs or network activity.
Automatic updates: Software updates that occur on their own to patch security issues.  Usually initiated by your computer system without your explicit approval.
Cloud:  A platform for storing and accessing your data and/or programs via the internet.
Connected Vehicle: A motorized vehicle with computational abilities such as being able to offer directions, interact with cell phones and MP3 players, and provide real-time tracking data.
Cyber Security: The practice of keeping unauthorized users out of your systems and away from your data.
Encrypt, Encryption:  Protecting sensitive information with a password or a key so only authorized parties who have it can view the information.
File Server: A device on the network that hosts files for remote computers and mobile devices to access.
Firewall: A device that controls and restricts the internet access of your local network
Hosted: When a platform, software or website resides in the cloud.
Intellectual Property, (IP): a work or invention that is the result of creativity, such as a manuscript or a design, to which one has rights and for which one may apply for a patent, copyright, trademark, etc.
Mobile Payment Software: A mobile app which allows a user to accept payment on the go, usually through an attachable card reader. Common software includes Square Reader, PayPal Here and Clover Go.
Physical Security: The practice of keeping people away from your physical equipment, such as work stations, servers, mobile devices and other sensitive areas.
Remotely: A method by which technical support or other works are conducted over the Internet.
Router: A device that directs traffic from one network (usually the Internet) to another (such as your home or office).
Secure Hyper Text Transfer Protocol, (HTTPS): A method by which computers establish a secure connection to a remote website to transfer data, such as web pages and other media.
Spreadsheet: A document in which data is organized into rows and columns. Usually used for accounting, and in products such as Microsoft Excel and Apple Numbers.
Thumb Drive: A device that plugs into your computer and/or mobile device that allows the transfer of files.
Two-Factor Authentication: A security measure that uses your phone number or email address to send you a temporary password after you login to your account.
Universal Resource Locator, (URL): A line of text that starts with a protocol and contains either a domain name or a IP address that refers to a specific service on the internet. Examples: http://example.com, https://example.com, ftp://example.com, smb://example.com.
Virtual Private Network, (VPN): A secure internet connection which transfers  data from a computer or mobile device  to another network securely.
WiFi Protected Access, (WPA), (WPA2): A more secure wireless security algorithm used to secure wireless access points. WPA and WPA2 are both considered secure.
Wireless Equivalent Privacy, (WEP): A less secure wireless security algorithm used to secure wireless access points. WEP is considered insecure, but is still commonly used today.