Learning Glossary
Informational articles and guides to help you learn more about technology topics in cybersecurity, cloud computing, and content delivery.
For education and training specific to Akamai products and solutions, please visit our Learning Hub.
Security
SECURITY
Learn about cybersecurity
Cybersecurity techniques help to protect networks, devices, and data from unauthorized access or criminal use.
-
What Is Cybersecurity? -
What Is Malware? -
Akamai Security Intelligence Group -
What Is Web Security? -
What Is Network Security? -
What Is Cybercrime? -
What Is SASE (Secure Access Service Edge)? -
What Is Cyber Resilience? -
What Is Threat Detection? -
What Is Threat Protection? -
What Is Enterprise Application Software? -
What Are Cybersecurity Solutions? -
What Is Cyberthreat Security? -
What is Ransomware? -
What Is IT Security? -
What Is Threat Intelligence? -
What Is OWASP?
SECURITY
Learn about DDoS attacks
A DDoS attack is an attempt to overwhelm a website or online service with traffic from multiple sources to render it unavailable to users.
-
What Is an ICMP Flood DDoS Attack? -
What Is a UDP Flood DDoS Attack? -
What Are SYN Flood DDoS Attacks? -
What Is a DDoS Booter? -
What Is a Layer 3 DDoS Attack? -
What Are Pseudo-Random Subdomain Attacks? -
What Is an SSL/TLS Exhaustion Attack? -
What Are Network Layers? -
What Is a CLDAP Reflection DDoS Attack? -
What Is a TCP Reset Flood DDoS Attack? -
What Is DoS Protection? -
What Is a WS-Discovery Flood? -
What Is an HTTP Flood DDoS Attack? -
What Is a GET Flood DDoS Attack? -
What Is an Application-Layer DDoS Attack? -
What Is a DDoS Attack? -
What Is an NTP Amplification Attack? -
What Is a Slowloris DDoS Attack? -
What Are Domain Generation Algorithms? -
What Is a QUIC Flood DDoS Attack? -
What Is a Volumetric Attack? -
What Is Blackhole Routing? -
What Is a Low and Slow Attack? -
What Is an SSDP DDoS Attack? -
What Is a Website Stresser? -
What Is NXDOMAIN DDoS? -
What Is a Ping Flood Attack?
SECURITY
Learn about microsegmentation
Microsegmentation is an emerging security best practice that offers several advantages over more established approaches like network segmentation and application segmentation.
SECURITY
Learn about Zero Trust
A Zero Trust security model is based on a philosophy that no person or device inside or outside of an organization's network should be granted access to connect to IT systems or services until authenticated and continuously verified.
-
What Is Remote Work Security? -
What Are Zero Trust Networks? -
Getting Started with Your Zero Trust Strategy -
What Is a Data Breach? -
What Is a Secure Internet Gateway? -
Zero Trust Security Model — What Is Zero Trust? -
What Is a Secure Web Gateway? -
How Does Network Security Fit into Zero Trust? -
What Is Account Takeover (ATO)? -
What Is Zero Trust Network Access (ZTNA)? -
What Is Zero Trust Networking? -
What Is Ransomware Protection? -
What Is Maze Ransomware?
SECURITY
Learn about web app and API protection
Web app and API protection (WAAP) is security technology that can help to protect web and mobile applications from attack. It can be implemented in a number of ways, including API management, firewalls, web application firewalls, and intrusion detection and prevention systems.
SECURITY
Learn about API security
API is the abbreviation for application programming interface. Just like you would protect your account passwords, it is equally important to protect API access, so that identifiers like API keys and API calls do not get misused.
-
What Is API Performance? -
What Is API Abuse? -
How Do APIs Work? -
What Is Credit Card Security? -
What Is Tokenization? -
What Is API Sprawl? -
What Is API Protection? -
What Are API Security Breaches? -
What Is an API Security Provider? -
What Is API Gateway Security? -
What Is an API Security Audit? -
What Is API Discovery? -
What Are API Security Risks? -
What Is API Security for Mobile Applications? -
How to Assess Your API Security -
What Is API Threat Hunting? -
What Is API Security? -
What Is an API Gateway? -
What Is OpenAPI Security? -
What Are API Security Threats? -
What Are API Attacks? -
What Is BOLA? -
What Is BOPLA? -
What Are API Vulnerabilities? -
What Are API Security Endpoints? -
What Is the API Lifecycle?
SECURITY
Learn about bots and botnets
Bots are software programs that carry out automated tasks. Botnets are networks of computers infected with bot software that can be controlled remotely by an attacker.
SECURITY
Learn about compliance frameworks
Compliance and regulatory frameworks are sets of documented guidelines and best practices. Organizations follow these guidelines to meet regulatory requirements, improve processes, strengthen security, and achieve other business objectives (such as becoming a public company, or selling cloud solutions to government agencies).
SECURITY
Learn about DNS
DNS, or the Domain Name System, translates human-readable domain names (for example, www.apple.com) to machine-readable IP addresses (for example, 17.253.207.54).
-
What Is Authoritative DNS? -
What Is Dynamic DNS (DDNS)? -
What Is Domain Management? -
What Is DNS? -
What Are DNS Attack Vectors? -
What Is DNS Security? -
What Is a DNS Firewall? -
What Are DNS Servers? -
What Is DNS Traffic Management? -
What Is a DNS Proxy? -
What Are Domain Generation Algorithms? -
What Are Lame Delegations? -
What Is DNS Data Exfiltration? -
What Is DNS Tunneling? -
What Is Protective DNS? -
What Is DNS Cache Poisoning? -
What Is Cloud Load Balancing? -
What Is DNS Rebinding? -
What Is Recursive DNS? -
What Is DNS Caching? -
What Is Global Server Load Balancing?
SECURITY
Learn about multi-factor authentication (MFA)
Multi-factor authentication is an authentication method in which a user is granted access only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism.
SECURITY
Learn about cyberattacks
Cyberattacks are attempts to gain unauthorized access to computer systems, steal data, or disrupt services.
-
What is Conti Ransomware? -
What Is Credential Stuffing? -
What Is WannaCry Ransomware? -
What is an Attack Vector? -
What Is Account Takeover (ATO)? -
What Is a Brute-Force Attack? -
What Is BlackCat Ransomware? -
What Is Spear Phishing? -
What Is a Cyber Attack or Cyberattack? -
What Is REvil? -
What Is Phishing? -
What Is Ransomware Protection? -
What Is a Zero-Day Attack? -
What is LockBit Ransomware? -
What Is Ransomware Removal? -
What Is Royal Ransomware? -
What Are the Types of Ransomware? -
What Is Petya Ransomware? -
What Is DarkSide Ransomware? -
What Is Magecart? -
What Is Ryuk Ransomware?
Cloud Computing
CLOUD COMPUTING
Learn about cloud computing
Cloud computing services are changing how businesses and public institutions use information technology.
-
How Does Cloud Computing Work? -
What Are Cloud Computing Models? -
What Are Cloud Databases? -
What Are Cloud Environment Types? -
What Are Cloud-Native Applications? -
What Are Cloud Resources? -
What Are Databases? -
What Are Message Queues in Event-Driven Architecture? -
What Are Web Servers? -
What Is a Cloud CDN? -
What Is a Cloud Platform? -
What Is a Container? -
What Is a Distributed Cloud? -
What Is AI on Edge Networks? -
What Is an Edge Network -
What Is an Edge Server? -
What Is an Event Consumer? -
What Is a Serverless Framework? -
What Is Cloud-Based Security? -
What Is Cloud Computing?
CLOUD COMPUTING
Learn about cloud computing
-
What Is Cloud Infrastructure? -
What Is Cloud Network Security? -
What Is Cloud Optimization? -
What Is Cloud Storage? -
What Is Data Leak Protection? -
What Is Digital Transformation? -
What is Edge Computing? -
What Is Enterprise Cloud Computing? -
What Is Enterprise Cloud Security? -
What Is Hybrid Cloud? -
What Is Infrastructure as a Service (IaaS)? -
What Is Managed Kubernetes? -
What Is Multicloud? -
What Is PaaS (Platform as a Service)? -
What Is Private Cloud? -
What is Public Cloud? -
What Is SaaS (Software as a Service)? -
What Is Serverless Computing? -
What Is Serverless Security? -
What Is Server Security? -
What Is the Client/Server Model? -
What Is the Cloud?
Content Delivery – CDN
CONTENT DELIVERY – CDN
Learn about CDNs
Content delivery networks, or CDNs, make online experiences faster and more reliable by delivering content closer to users.
CONTENT DELIVERY – CDN
Learn about streaming and media delivery
Demand for streaming media services and media delivery is growing quickly, presenting content providers with new revenue opportunities and new technical challenges as well.
Learn how the internet works
In a series of short video presentations, Robert Blumofe, Akamai Executive Vice President and Chief Technology Officer, explains how the foundation stones of the World Wide Web work. Other related articles of interest are listed here as well.
Learn about website monitoring
Website monitoring helps proactively track website health and availability for better uptime, higher performance, and an excellent user experience.