Virtual Machines
Windowz
Stuff
Recovery
Random
100

A master copy image of a virtual machine that includes VM disks, virtual devices, and settings.

VM Template

100

The fixed state of a Windows-based computer and data used to return a computer to an earlier functional time.

Restore Point

100

The backup software of MacOS designed to work with local storage devices, network-attached disks, and external disk drives.

Time Machine

100

Involves monitoring and defending computing devices such as desktops, laptops, smartphones, tablet computers, web APIs, IoT devices, etc. against cyber threats.

Endpoint Protection

100

A type of malware that prevents or limits users from accessing their system by locking the system's screen, encrypting critical software or system files, or by locking the users' access to their data until a ransom is paid.

Ransomware

200

The state of a running image (VM), generally captured as the differences between an image and the current state.

Snapshot

200

Implementing the hardware, software, data, and any capabilities or services that were impaired due to a cybersecurity event.

Restoration

200

Protecting digital systems and their data from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality, and availability.

Information Security

200

Any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems.

Malicious Software (Malware)

200

A file containing a series of commands run in a sequence to automate routine tasks without requiring user input or intervention.

Batch File

300

A virtual machine that is a copy of the original.

Virtual Machine (VM) Clone

300

A Microsoft snapshot mechanism for all files that users store in the primary folders or directories associated with their user accounts, formerly known as libraries, as long as there is an external drive attached.

Windows File History

300

Scale of how well a system is rated to be protected from cyber-attacks.

Cyber Resilience

300

The ability to regain access and functionality of critical data systems and IT infrastructure as soon as possible after a cyberattack.

Recoverability

300

A cyberattack in which an unauthorized user gains access to a system or network and remains there for an extended period without being detected.

Advanced Persistent Threat (APT)

400

Data and system changes are backed up on a regular basis through comprehensive copy and journaling strategies.

Continuous Data Protection (CDP)

400

Works by Windows periodically crawling the system, identifying file changes made since the last crawl, indexing the changes, and stacking the changes on top of each other which creates a history of the file/folder.

Shadow Copies

400

The alternative method of continuing business operations if its systems are unavailable.

User Contingency Plan

400

A subset of security solutions built to defend sensitive data against complex cyberattacks by combining cloud security, email security, endpoint security, and more to augment an organization's defenses amid the ever-changing threat landscape.

Advanced Threat Protection (ATP)

400

An attack, via cyberspace, targeting an enterprise’s use of cyberspace for the purpose of disrupting, disabling, destroying, or maliciously controlling a computing environment/infrastructure; or destroying the integrity of the data or stealing controlled information.

Computer Network Attack (CNA)

500

A structure or arrangement of backup or version control data at different points in time, allowing for easy retrieval of specific versions or states of data for recovery or comparison purposes.

Snapshot Hierarchy

500

The recovery of lost files that have been deleted from your local storage device (including internal drives, external drives, and USB devices) and can’t be restored from the Recycle Bin.

Windows File Recovery

500

Using syndicated promotional material within Internet-connected programs that intentionally harm information assets and devices.

Malvertising

500

Data recovery service that specializes in retrieving data after natural disasters.

Ontrack

500

Refers to removing software restrictions imposed by the manufacturer on a device, such as a smartphone or a tablet.

Jailbreak