Page 66 - 22.03.2021_IO1-CURRICULUM-FOR-VET-PROVIDERS_FINAL_plus-graphics
P. 66

SEO                   SEO  stands  for  Search  Engine  Optimization,  which  is  the

                                     practice of increasing the quantity and quality of traffic to a
                                     website through organic search engine results.
               Sessions              A session is defined as a group of interactions one user takes
                                     within a given time frame on a website.

               Social media          Social  media  refers  to  websites  and  applications  that  are
                                     designed to allow people to share content quickly, efficiently,
                                     and in real-time.

               Users                 Is the number of new and returning people who visit a certain
                                     site during a set period of time.
               VoIP                  Voice  over  Internet  Protocol  is  a  category  of  hardware  and
                                     software  that  enables  people  to  use  the  Internet  as  the

                                     transmission medium for telephone calls by sending voice data
                                     in packets using IP.
               Web traffic           Is the number of web users who travel to any given website.

                                Module 7: “Cybersecurity – protect your start-up”
               Cloud computing   A  means  to  offer  computing  services  to  the  public  or  for
                                     internal  use  through  remote  services.  Most  cloud  computing

                                     systems  are  based  on  remote  virtualization  where  the
                                     application  or operating  environment  offered  to  customers is
                                     hosted on the cloud provider's computer hardware.
               Cyberattack           Any  attempt  to  violate  the  security  perimeter  of  a  logical

                                     environment.  An  attack  can  focus  on  gathering  information,
                                     damaging  business  processes,  exploiting  flaws,  monitoring
                                     targets, interrupting business tasks, extracting value, causing
                                     damage to logical or physical assets or using system resources

                                     to support attacks against other targets.
               Cybersecurity         The efforts to design, implement, and maintain security for an
                                     organization's network, which is connected to the Internet. It

                                     is a combination of logical/technical-, physical- and personnel-
                                     focused countermeasures, safeguards and security controls.
               Data breach           The  occurrence  of  disclosure  of  confidential  information,
                                     access to confidential information, destruction of data assets





                                                     Programme: Erasmus+
                                   Key Action: Cooperation for innovation and the exchange of good practices
                                   Action Type: Strategic Partnerships for vocational education and training
                                             Project Number: 2019-1-PL01-KA202-065209
                                                                                                        66
   61   62   63   64   65   66   67