Episode 9 — Glossary Deep Dive Part 2: Infrastructure and Software

In this episode, we continue our glossary journey through key ITF Plus acronyms. These terms span from the letter E to N and include critical concepts in permissions, virtualization, encryption, operating systems, storage, networking, and protocols.
Knowing these acronyms can help you answer questions about Linux, network services, system resources, and cloud technologies. This episode maintains the same format as before, offering brief, focused definitions of each acronym using three sentences per term.
Input Output Operations Per Second, or I O P S, measures how many read and write operations a storage device can perform in one second. Higher I O P S indicates better performance for tasks like database access or virtual machine workloads. It’s a key metric when evaluating solid-state or hard disk storage systems.
Internet Protocol, or I P, is the method used to send data between computers across networks. Each device is assigned a unique I P address for identification. I P is a foundational part of how the internet and local networks function.
International Standards Organization, or I S O, develops international guidelines and standards for technology and business. In computing, I S O often refers to standard file formats or disk image files. The organization ensures consistency and compatibility across global systems.
JavaScript Object Notation, or J S O N, is a lightweight data format used to store and exchange information. It’s commonly used in web development and APIs for structuring readable data. J S O N uses key-value pairs and is easy for both humans and machines to parse.
Kerberos 5, or K R B 5, is a network authentication protocol that uses secret-key cryptography. It allows secure login to systems without sending passwords in plain text. K R B 5 is often used in enterprise and educational environments for user authentication.
Kernel-based Virtual Machine, or K VM, is a virtualization technology that turns Linux into a type one hypervisor. It allows multiple virtual machines to run on a single physical system. K VM is built into the Linux kernel and commonly used in data centers.
Local Area Network, or L A N, is a network that connects computers and devices within a limited area like a home, office, or campus. It typically uses Ethernet or Wi-Fi for connectivity. L A Ns are fast, private networks for sharing resources and communication.
Lightweight Directory Access Protocol, or L D A P, is a protocol used to access and manage directory services over a network. It allows applications to look up user accounts and device information from a centralized directory. L D A P is commonly used in identity and access management systems.
Large Language Model, or L L M, refers to a type of artificial intelligence trained on vast text datasets to understand and generate human language. These models power tools like chatbots, summarizers, and translators. While not a major topic on the ITF Plus exam, L L M is a modern term you may encounter.
Linux Unified Key Setup, or L U K S, is a standard for disk encryption in Linux. It protects data at rest by requiring a passphrase to unlock the drive. L U K S ensures confidentiality even if the physical device is stolen.
Linux Unified Key Setup 2, or L U K S 2, is the updated version of the L U K S disk encryption standard. It includes stronger cryptographic options and more flexible configuration. L U K S 2 is backward compatible but offers better security controls.
Logical Volume Manager, or L VM, is a method of managing disk storage that allows flexible allocation and resizing of volumes. It acts as a layer between physical disks and file systems. L VM makes it easier to manage space without repartitioning.
Media Access Control, or M A C, refers to the hardware address assigned to network interfaces. Each device on a network has a unique M A C address used for identification at the data link layer. M A C addresses are essential for local communication and filtering.
Master Boot Record, or M B R, is the traditional boot sector used to start operating systems on older disks. It contains partition information and code to launch the OS. M B R has been largely replaced by G P T on newer systems.
Multi-Factor Authentication, or M F A, is a security method that requires two or more forms of verification. This may include something you know, something you have, or something you are. M F A significantly increases security by making unauthorized access more difficult.
Management Information Base, or M I B, is a collection of data objects used by network management protocols like S N M P. It organizes information about network devices for monitoring and control. M I B is part of how administrators manage routers, switches, and servers.
Maximum Transmission Unit, or M T U, defines the largest size of a data packet that can be sent over a network connection. If a packet exceeds the M T U, it must be broken into smaller fragments. M T U settings can affect performance and reliability.
Network-Attached Storage, or N A S, is a dedicated storage device connected to a network. It allows multiple users and systems to access shared files. N A S is often used for backups, media storage, or collaborative work environments.
Network Address Translation, or N A T, modifies I P addresses as data passes through a router. It allows multiple devices to share a single public I P address. N A T provides both conservation of I P addresses and a layer of security.
Network File System, or N F S, is a protocol that allows users to access files over a network as if they were local. It’s commonly used in Unix and Linux environments. N F S supports file sharing across different machines and systems.
Network Interface Card, or N I C, is the hardware component that connects a computer to a network. It provides the physical and data link layer interfaces. N I Cs may be built into the motherboard or installed as expansion cards.
Network Time Protocol, or N T P, is used to synchronize clocks between computers over a network. Accurate timekeeping is essential for logging, security, and file timestamps. N T P ensures that all systems maintain a consistent clock.
Non-Volatile Memory Express, or N VM e, is a high-speed storage protocol used with solid-state drives. It connects directly over the PCI Express bus for fast performance. N VM e is much faster than older SATA-based storage methods.
Out of Memory, or O O M, is a condition where a system has exhausted its available RAM. When this happens, the system may terminate processes to free memory. O O M events can cause application crashes or slowdowns.
Open Security Content Automation Protocol, or Open S C A P, is a toolset for automated vulnerability scanning and compliance checks. It uses standardized formats to assess system security. Open S C A P is commonly used in enterprise Linux environments.
Open Secure Sockets Layer, or Open S S L, is an open-source implementation of encryption protocols like S S L and T L S. It provides secure communication over networks, especially for HTTPS. Open S S L is widely used in web servers and applications.
Operating System, or O S, is the core software that manages computer hardware and applications. It controls memory, processes, files, and input-output devices. Examples include Windows, Linux, and mac O S.
Pluggable Authentication Modules, or P A M, provide a flexible way to integrate different authentication methods into a system. P A M allows for customization of login behavior and credential checking. It is used extensively in Unix and Linux systems.
Python Enhancement Proposal, or P E P, is a design document that describes new features or improvements for the Python programming language. Each P E P goes through discussion before being accepted or rejected. P E P 8, for example, defines coding style guidelines.
Hypertext Preprocessor, or P H P, is a server-side scripting language used to build dynamic web pages. It’s embedded within HTML and executed on the server. P H P is widely used in content management systems like WordPress.
Process Identification Number, or P I D, is a unique number assigned by the operating system to each running process. It helps manage and control processes during execution. P I Ds are useful for debugging and monitoring system performance.
Public Key Infrastructure, or P K I, is a framework for managing encryption keys and digital certificates. It supports secure communication, digital signatures, and authentication. P K I is the backbone of internet trust models like HTTPS.
Parent Process Identification Number, or P P I D, identifies the process that launched another process. It helps track the relationship between programs on a system. Understanding P P I Ds is helpful when managing system processes.
Precision Time Protocol, or P T P, is used for synchronizing clocks in systems that require extremely precise timing. It is more accurate than N T P and often used in industrial or telecom environments. P T P reduces delay and jitter in time-sensitive applications.
For more cyber related content and books, please check out cyber author dot me. Also, there are other prep casts on Cybersecurity and more at Bare Metal Cyber dot com.
Physical Volume, or P V, is a term in Logical Volume Management that refers to an actual storage device. Multiple P Vs can be grouped into volume groups. This enables flexible and scalable disk management.
Preboot Execution Environment, or P X E, allows a computer to boot from a network server instead of local storage. It is often used for installing operating systems remotely. P X E is useful in enterprise environments with many systems to configure.
Q C O W stands for Q E M U Copy On Write, a disk image format used by virtualization software. It allows snapshots, compression, and encryption of virtual disks. Q C O W is efficient and flexible for virtual machine storage.
Quick Emulator, or Q E M U, is an open-source system emulator and virtualization platform. It allows users to run multiple operating systems on a single host. Q E M U is commonly used for testing and development.
Redundant Array of Independent Disks, or R A I D, is a storage method that combines multiple drives for redundancy or performance. Different levels like R A I D zero or R A I D five offer varying trade-offs. R A I D improves fault tolerance or read-write speed depending on configuration.
Random Access Memory, or R A M, is the short-term memory used by computers to store active data and instructions. It allows fast read and write access while applications are running. More R A M improves system performance and multitasking ability.
Reduced Instruction Set Computer, or R I S C, is a processor design that uses a small set of simple instructions for faster execution. R I S C architectures are efficient and often found in mobile devices. A R M is a popular R I S C-based design.
Red Hat Package Manager, or R P M, is a tool used to install, update, and manage software packages on Linux systems. It uses files with an R P M extension to track versions and dependencies. R P M is common in Red Hat and Fedora-based distributions.
Storage Area Network, or S A N, is a dedicated network that provides access to consolidated storage devices. It allows multiple servers to access shared data as if it were local. S A Ns are used in enterprise environments for high-performance storage.
Security Enhanced Linux, or S E Linux, is a security module that enforces access control policies on Linux systems. It provides fine-grained control over what processes can do. S E Linux is used to strengthen security in sensitive environments.
Set Group Identifier, or set G I D, is a permission setting in Unix systems that allows files or directories to inherit the group ID of their parent. When applied to a directory, new files inside will have the same group. This is useful for shared workspaces.
Set User Identifier, or set U I D, is a permission setting that allows a program to run with the privileges of its owner. It is often used for system utilities that require root access. Set U I D must be handled carefully to avoid security risks.
Secure File Transfer Protocol, or S F T P, is a secure way to transfer files over a network. It uses Secure Shell, or S S H, for encryption and authentication. S F T P is preferred over older, unencrypted file transfer methods.
That concludes Episode 9 of the ITF Plus PrepCast. These definitions cover key Linux, system, and network terms from E to N that often appear in exam questions. Join us in the next episode to complete the glossary with acronyms from O to Z.

Episode 9 — Glossary Deep Dive Part 2: Infrastructure and Software
Broadcast by