Glossary

Welcome to the Glossary! Whether you're already familiar with some of these terms or you're just becoming acquainted, our top-level glossary is a great resource for learning all of the relevant goods. Scroll through the full list below, search by term, or select by individual letter.
SHOW ALL A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Azure SQL

An intelligent and scalable cloud databases service that provides the broadest SQL Server engine compatibility.

BaaS

BaaS, short for Backend-as-a-Service, allows developers to focus on the frontend of their applications and leverage backend services without building or maintaining them.

Backdoor

In the world of cybersecurity, a backdoor refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software application. Once they're in, cybercriminals can use a backdoor to steal personal and financial data, install additional malware, and hijack devices. Backdoors are known for being discreet and attacks can often go undetected, resulting in them being used over and over again.

BAI

BAI, or BAI file format, is a file format for performing electronic cash management balance reporting. It was developed and previously maintained by the Bank Administration Institute (BAI). BAI does not separate out the incoming check line items by invoice subtotal reference.

BAI2

BAI2 is a banking EDI format. It is a specialized and standardized set of codes used for cash management by the Bank Administration Institute (BAI). BAI2 splits the check total into separate invoice references and assoicated payment amounts.

Bank Administration Institute (BAI)

The Bank Administration Institute is a non-profit organization in the US that provides training, research, and leadership events for the finance industry.

Batch File

A type of script that contains a list of commands. These commands are executed in sequence and can be used to automate processes.

Blockchain

A ledger or chain of information that retails a detailed history of digital transactions. They are meant to help protect against counterfeiting and to safeguard digital transactions.

Bot

A computer or system that has been compromised and is undetected. The computer can be controlled directly by a bot master or herder for the purpose of spamming or launching a DDoS attack. It may also have been programmed to perform certain actions when interfacing with human input or websites.

Box

A cloud content management and file sharing service for businesses. It is available as a GoAnywhere Cloud Connector. 

CCC

Short for Clear Command Channel. The CCC command makes a secured control/command channel revert back to plaintext (unsecured). It helps to solve data connection problems.

CDN

A CDN, or Content Delivery Network, refers to a geographically distributed group of servers which work together to provide fast delivery of internet content.

CDR

Stands for Content Disarm and Reconstruction. CDR is an advanced threat prevention technology that does not rely on detection. Instead, it assumes all files are malicious, so it sanitizes and rebuilds each file ensuring full usability and safe content.

Certificate Authority

An entity that issues digital certificates, the highest level of trust.

Checksum

A checksum is a sequence of numbers and letters used to check for errors that may have been introduced during transmission or storage. By themselves, checksums are often used to verify data integrity, but are not relied upon to verify data authenticity.

CICA

Short for Context Inspired Component Architecture. It is ASC X12’s message-design methodology, created to help resolve costly, differing, and often incompatible XML messages used for B2B (Business-to-Business) data exchange. 

CIFS

Stands for Common Internet File System. It is a dialect of SMB. 

Ciphertext

The result of encryption performed on plaintext using an algorithm, known as a cipher. 

Cloud Computing

This refers to applications and services offered over the internet. They are essentially data centers, collectively referred to as "the cloud." Cloud computing uses a network of remote servers hosted on the internet to store, manage, and process data, rather than a local server or a personal computer. Cloud Computing services falls into four categories: IaaS, FaaS, PaaS, and SaaS.

Cloud File Transfer

Transferring or syncing files securely from one cloud service directly to another. 

Cloud Intergrations

Cloud integrations, or cloud connectors, are built-in web and cloud application integrations that connect to your GoAnywhere MFT projects and workflows.

Clustering

Using two or more computer systems that work together. Typically, this refers to multiple servers that are linked together in order to handle varying workloads or to provide continued operation in case one fails.

Compliance

This indicates that a vendor successfully recognizes a particular standard and encompass most, if not all, of that key standard.

Compression

A way to improve transmission time by shrinking the size of messages.

Cryptocurrency

Cryptocurrency is a digital currency that can be used to buy goods and services. It uses an online ledger with strong cryptography to secure online transactions.

Cryptography

The science of protecting information by transforming it into a secure format.

Cryptojacking

Cryptojacking is an online threat with the main purpose of stealing or \"mining\" cryptocurrencies.

CSE

Short for the Canadian Communication Security Establishment. It is one of Canada’s key security and intelligence organizations. They are responsible for protecting Canadian government electronic information and communication networks, among other duties.

CSR

Short for Certificate Signing Requests. It is a block of encoded text that is given to a Certificate Authority when applying for an SSL Certificate.

CSV (file)

Stands for Comma-Separated Values. A CSV file is a delimited text file that uses a literal comma to separate files. 

DAR

Short for Data at Rest. DAR refers to inactive data that is stored physically in any digital form, such as databases, spreadsheets, archives, mobile devices, and more. It is subject to threats from hackers and other malicious threats.

Data Classification

Data classification is the act of organizing data by relevant categories so that it may be used and protected more efficiently.

Data in Transit

Data in Transit, also known as Data in Motion or Data in Flight, is used to describe data that is in transit from one location to another through networks (cellular, Wi-Fi, private, etc.). The term is often used in laws and regulations to define another key state where data must be secured.

Data Key

A key which holds a variable value. It can be applied to a string or a text block in order for it to be encrypted or decrypted. 

Data Mining

Data Mining is a process of discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems.