Learning Glossary
Informational articles and guides to help you learn more about technology topics in cybersecurity, cloud computing, and content delivery.
For education and training specific to Akamai products and solutions, please visit our Learning Hub.
Security
SECURITY
Learn about cybersecurity
Cybersecurity techniques help to protect networks, devices, and data from unauthorized access or criminal use.
-
What Is Web Security? -
What Is Cybersecurity? -
Akamai Security Intelligence Group -
What is Ransomware? -
What Is Malware? -
What Is Cyber Resilience? -
What Is Threat Protection? -
What Is Network Security? -
What Are Cybersecurity Solutions? -
What Is Cybercrime? -
What Is Cyberthreat Security? -
What Is IT Security? -
What Is Enterprise Application Software? -
What Is Threat Detection? -
What Is SASE (Secure Access Service Edge)? -
What Is OWASP? -
What Is Threat Intelligence?
SECURITY
Learn about DDoS attacks
A DDoS attack is an attempt to overwhelm a website or online service with traffic from multiple sources to render it unavailable to users.
-
What Is a UDP Flood DDoS Attack? -
What Is a QUIC Flood DDoS Attack? -
What Is an ICMP Flood DDoS Attack? -
What Is an Application-Layer DDoS Attack? -
What Is a Website Stresser? -
What Is a DDoS Attack? -
What Is an SSDP DDoS Attack? -
What Is an HTTP Flood DDoS Attack? -
What Is DoS Protection? -
What Are Pseudo-Random Subdomain Attacks? -
What Are Domain Generation Algorithms? -
What Is a Volumetric Attack? -
What Is a WS-Discovery Flood? -
What Are SYN Flood DDoS Attacks? -
What Is an SSL/TLS Exhaustion Attack? -
What Is a GET Flood DDoS Attack? -
What Is a Layer 3 DDoS Attack? -
What Is an NTP Amplification Attack? -
What Is a Low and Slow Attack? -
What Is a TCP Reset Flood DDoS Attack? -
What Are Network Layers? -
What Is a Slowloris DDoS Attack? -
What Is Blackhole Routing? -
What Is a DDoS Booter? -
What Is a CLDAP Reflection DDoS Attack? -
What Is a Ping Flood Attack? -
What Is NXDOMAIN DDoS?
SECURITY
Learn about microsegmentation
Microsegmentation is an emerging security best practice that offers several advantages over more established approaches like network segmentation and application segmentation.
SECURITY
Learn about Zero Trust
A Zero Trust security model is based on a philosophy that no person or device inside or outside of an organization's network should be granted access to connect to IT systems or services until authenticated and continuously verified.
-
Zero Trust Security Model — What Is Zero Trust? -
What Is a Data Breach? -
Getting Started with Your Zero Trust Strategy -
What Is Zero Trust Networking? -
What Are Zero Trust Networks? -
What Is a Secure Web Gateway? -
What Is Zero Trust Network Access (ZTNA)? -
What Is Ransomware Protection? -
How Does Network Security Fit into Zero Trust? -
What Is a Secure Internet Gateway? -
What Is Account Takeover (ATO)? -
What Is Remote Work Security?
SECURITY
Learn about web app and API protection
Web app and API protection (WAAP) is security technology that can help to protect web and mobile applications from attack. It can be implemented in a number of ways, including API management, firewalls, web application firewalls, and intrusion detection and prevention systems.
SECURITY
Learn about API security
API is the abbreviation for application programming interface. Just like you would protect your account passwords, it is equally important to protect API access, so that identifiers like API keys and API calls do not get misused.
-
How Do APIs Work? -
What Is API Gateway Security? -
What Are API Attacks? -
What Is API Security for Mobile Applications? -
What Is an API Security Provider? -
What Is API Threat Hunting? -
How to Assess Your API Security -
What Is API Sprawl? -
What Is an API Gateway? -
What Is OpenAPI Security? -
What Is an API Security Audit? -
What Is API Performance? -
What Is API Protection? -
What Is API Security? -
What Are API Security Breaches? -
What Is Tokenization? -
What Is Credit Card Security? -
What Are API Security Risks? -
What Is API Abuse? -
What Is API Discovery? -
What Are API Security Endpoints? -
What Are API Security Threats? -
What Is BOLA? -
What Is BOPLA? -
What Are API Vulnerabilities?
SECURITY
Learn about bots and botnets
Bots are software programs that carry out automated tasks. Botnets are networks of computers infected with bot software that can be controlled remotely by an attacker.
SECURITY
Learn about compliance frameworks
Compliance and regulatory frameworks are sets of documented guidelines and best practices. Organizations follow these guidelines to meet regulatory requirements, improve processes, strengthen security, and achieve other business objectives (such as becoming a public company, or selling cloud solutions to government agencies).
SECURITY
Learn about DNS
DNS, or the Domain Name System, translates human-readable domain names (for example, www.apple.com) to machine-readable IP addresses (for example, 17.253.207.54).
-
What Is DNS Tunneling? -
What Is DNS Data Exfiltration? -
What Is a DNS Proxy? -
What Is Protective DNS? -
What Are Lame Delegations? -
What Is DNS Cache Poisoning? -
What Are Domain Generation Algorithms? -
What Is DNS Security? -
What Is a DNS Firewall? -
What Is Global Server Load Balancing? -
What Is Dynamic DNS (DDNS)? -
What Is Authoritative DNS? -
What Are DNS Attack Vectors? -
What Is DNS Traffic Management? -
What Is Cloud Load Balancing? -
What Is Domain Management? -
What Is DNS? -
What Are DNS Servers? -
What Is DNS Caching? -
What Is DNS Rebinding? -
What Is Recursive DNS?
SECURITY
Learn about multi-factor authentication (MFA)
Multi-factor authentication is an authentication method in which a user is granted access only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism.
SECURITY
Learn about cyberattacks
Cyberattacks are attempts to gain unauthorized access to computer systems, steal data, or disrupt services.
-
What Is a Zero-Day Attack? -
What Is WannaCry Ransomware? -
What is an Attack Vector? -
What Is Phishing? -
What Is a Brute-Force Attack? -
What Is BlackCat Ransomware? -
What Is REvil? -
What Is a Cyber Attack or Cyberattack? -
What Is Credential Stuffing? -
What is Conti Ransomware? -
What Is Ransomware Protection? -
What Is Account Takeover (ATO)? -
What Is Spear Phishing? -
What Is Magecart? -
What is LockBit Ransomware? -
What Is Ransomware Removal? -
What Is Royal Ransomware? -
What Is Ryuk Ransomware? -
What Are the Types of Ransomware? -
What Is Petya Ransomware? -
What Is DarkSide Ransomware?
Cloud Computing
CLOUD COMPUTING
Learn about cloud computing
Cloud computing services are changing how businesses and public institutions use information technology.
-
How Does Cloud Computing Work? -
What Are Cloud Computing Models? -
What Are Cloud Databases? -
What Are Cloud Environment Types? -
What Are Cloud-Native Applications? -
What Are Cloud Resources? -
What Are Databases? -
What Are Message Queues in Event-Driven Architecture? -
What Are Web Servers? -
What Is a Cloud CDN? -
What Is a Cloud Platform? -
What Is a Container? -
What Is a Distributed Cloud? -
What Is AI on Edge Networks? -
What Is an Edge Network -
What Is an Edge Server? -
What Is a Serverless Framework? -
What Is Cloud-Based Security? -
What Is Cloud Computing? -
What Is Cloud Edge Computing?
CLOUD COMPUTING
Learn about cloud computing
-
What Is Cloud Infrastructure? -
What Is Cloud Network Security? -
What Is Cloud Optimization? -
What Is Cloud Storage? -
What Is Data Leak Protection? -
What Is Digital Transformation? -
What is Edge Computing? -
What Is Enterprise Cloud Computing? -
What Is Enterprise Cloud Security? -
What Is Hybrid Cloud? -
What Is Infrastructure as a Service (IaaS)? -
What Is Managed Kubernetes? -
What Is Multicloud? -
What Is PaaS (Platform as a Service)? -
What Is Private Cloud? -
What is Public Cloud? -
What Is SaaS (Software as a Service)? -
What Is Serverless Computing? -
What Is Serverless Security? -
What Is Server Security? -
What Is the Client/Server Model? -
What Is the Cloud?
Content Delivery – CDN
CONTENT DELIVERY – CDN
Learn about CDNs
Content delivery networks, or CDNs, make online experiences faster and more reliable by delivering content closer to users.
CONTENT DELIVERY – CDN
Learn about streaming and media delivery
Demand for streaming media services and media delivery is growing quickly, presenting content providers with new revenue opportunities and new technical challenges as well.
Learn how the internet works
In a series of short video presentations, Robert Blumofe, Akamai Executive Vice President and Chief Technology Officer, explains how the foundation stones of the World Wide Web work. Other related articles of interest are listed here as well.
Learn about website monitoring
Website monitoring helps proactively track website health and availability for better uptime, higher performance, and an excellent user experience.