68 terms
Hardware and device security terms
Hardware and device security terms describe physical computer parts and their weaknesses against outside threats. In this glossary, learn about VPN hardware, smartphone device security, and other device cybersecurity definitions.
CPU interrupt code
A CPU interrupt code is a signal or instruction that tells the CPU (a computer’s central processing unit) to stop what it is doing and handle something important right away.
Hardware security module
Hardware security module (HSM) refers to a device that keeps cryptographic keys safe and performs secure operations, like encryption, hashing, and digital signing, in a very secure environment.
Confidential Computing
Confidential computing is a privacy and security-focused technology that protects data while it’s being used — not just when it's stored or transmitted.
Unified computing system
A unified computing system is a system that makes data center architecture more easily manageable.
Trusted computing
Trusted computing is a computing structure created to boost the security of computers or networks by forming a foundation of trust.
Thumb drive
A thumb drive is a small, portable device that is used to store and transfer data.
System unit
A system unit is the main box-like structure of a computer with all the essential components needed for the computer to work.
System bus
A system bus functions as the vital communication route in a computer.
Spectre vulnerability
The Spectre vulnerability is a security flaw in modern microprocessors that allows attackers to access sensitive information through a process known as “speculative execution”.
Solid-state drive
Solid-state drive refers to a type of non-volatile storage device that stores persistent data on solid-state flash memory.
Serial port
A serial port is a type of interface that allows the transfer of data one bit at a time, in contrast to a parallel port which allows multiple bits to be transferred simultaneously.
Secure print
Secure print is a feature that enables users to print confidential documents securely.
Secure enclave
A secure enclave represents a feature embedded in contemporary computing hardware, offering an additional security level to protect data.
Rowhammer
Rowhammer is a security exploit in certain types of dynamic random-access memory (DRAM) chips.
Root of trust
A root of trust, or RoT, is a foundational component in a trusted computing system that establishes the initial level of trust.
RFID tag
An RFID tag is an electronic tag or tracking device that uses radio frequency technology to exchange information with an RFID reader.
Redundant hardware
Redundant hardware means having extra backup equipment in a system or network to prevent problems and keep things running smoothly.
Read-only memory
Read-only memory is a type of non-volatile memory used in computers and electronic devices.
Random access memory
Random access memory (RAM) is a form of volatile computer memory that stores data and machine code currently being used by a computer's processor.
Protected mode
Protected mode is an operational mode for x86-compatible central processing units (CPUs).
Power-on self-test
The power-on self-test (POST) is an automated check a computer does when powered on to make sure all hardware components are working properly.
Power distribution unit
A power distribution unit (PDU) is a device that provides power to IT equipment in data centers, such as computers, servers, and other networking devices.
Peripheral device
A peripheral device is hardware attached to a computer system that provides the system with extra functions but does not contribute to its primary function.
PCI bus
The PCI bus is a rapid hardware interface that facilitates the attachment of diverse peripheral components to a computer's motherboard.
Network on a chip
A network on a chip (often shortened to simply “NoC”) is a communication infrastructure model where multiple components are integrated into a single chip.
Microarchitecture
In simple words, Microarchitecture is the design and layout of various processor components at the hardware level.
Memory refresh
Memory refresh refers to a process where data stored in temporary memory, specifically in dynamic random-access memory (DRAM), is regularly rewritten or refreshed to ensure that it doesn't disappear or get corrupted over time.
Memory cache
A memory cache is a data storage layer that temporarily stores frequently accessed data and instructions to speed up the performance of a computer system.
Memory bottleneck
A memory bottleneck is like a traffic jam in a computer.
Memory Address Register
MAR, or “Memory Address Register,” is part of a computer’s central processing unit (CPU).
Mean time to failure
A mean time to failure (also known as MTTF) is a metric that estimates the average time a device, system, or product is expected to last before its first failure.
Level 3 cache
Level 3 cache is a type of cache memory used in computer processors to store frequently accessed data and instructions.
L2 cache
L2 cache, is a type of static RAM memory used by the central processing unit.
L1 cache
L1 cache refers to a type of high-speed static RAM (SRAM) that a processor uses to store information it will likely need to access immediately.
Keypunch machine
A keypunch machine is an early form of data entry device that was used to produce punched cards, which enabled users to input data into early computers.
Java Card
Java Card is a technology that allows Java programs (applets) to run securely on smart cards and similar small memory devices.
I/O controller
An I/O controller refers to a hardware element or chip that oversees the input and output interactions between a computer's central processing unit (CPU) and peripheral devices like storage drives, keyboards, and printers.
Integrated drive electronics
Integrated drive electronics (IDE) refers to a popular standard interface for connecting storage devices.
Integrated circuit
An integrated circuit is a system of electrical circuits embedded on a small, usually silicon wafer.
Hybrid hard drive
A hybrid hard drive is a computer storage device that combines elements of both traditional hard disk drives (HDDs) and solid-state drives (SSDs).
Hot plugging
Hot plugging is the act of adding hardware components to or removing them from a computer system while it is still running.
Hardware identification
Hardware identification is a method utilized by the Windows operating system (OS) to determine what kind of computer hardware is running the OS.
Hardware acceleration
Hardware acceleration is the process of offloading certain computing tasks from the central processing unit (CPU) onto specialized hardware components, improving performance, efficiency, and user experience.
Halt and Catch Fire
Halt and Catch Fire is a computer machine code instruction that was originally meant to make a computer's central processing unit (CPU) stop working, but in some cases could cause it to overheat and physically damage the hardware.
Green Computing
Green computing is environmentally responsible use of computers and related resources.
Firmware
Firmware is a type of software that provides low-level control over the hardware it is embedded into.
Execute Disable Bit
Execute Disable Bit is a proprietary no-execute (NX) bit technology found in Intel CPUs.
Endpoint device
An endpoint device is end-user hardware that communicates across a computer network.
Dumb terminal
A dumb terminal is a display screen and input device (often a keyboard) that has little to no processing capabilities.
Dongle
A dongle is a small hardware device that connects to another, such as a computer or a smartphone, to provide it with additional functionality or to enable a specific software application to run.
Direct memory access
Direct memory access is a process that enables specific hardware subsystems, like peripheral devices, to access a computer's primary memory (RAM) directly without requiring the involvement of the CPU.
Device hash
A device hash is a unique identifier based on the attributes of a computing device's hardware components.
Data Center Rack
A data center rack is a physical structure that houses multiple server units, storage devices, and other equipment used in data centers.
Data bus
Data bus is a computer subsystem that facilitates the exchange of information between various components on a motherboard or system board or between separate computers.
CPU contention
CPU contention refers to a situation where multiple virtual machines (VMs) or processes compete for the central processing unit's (CPU) resources, causing performance degradation.
Control unit
A control unit is a fundamental part of a computer's central processing unit (CPU).
Control bus
The control bus manages the communication between the computer's CPU and its other components.
Consumer electronics
Consumer electronics is a broad term referring to any type of electronics intended for purchase and use by customers in their daily lives, both personal and professional.
Commodity computing
Commodity computing refers to the use of standardized, off-the-shelf hardware components for computing, which are widely available and interchangeable among various systems.
Chipset
A chipset is a set of integrated circuits that manage the communication between the computer's processor and other hardware.
Cache hit
A cache hit is an event in which the requested content is successfully found and served from the cache memory.
Cache coherence
Cache coherence is used in shared memory multiprocessor systems to provide uniformity of the data that is stored across multiple local caches.
Bullet camera
A bullet camera is a type of surveillance camera that is designed to be small, cylindrical, and easy to install.
Baseboard management controller
A baseboard management controller is a small specialized processor on a server's, network’s, or computer’s motherboard.
ARM processor
ARM processors are a family of low-power, high-performance microprocessors designed by ARM Ltd.
Arithmetic logic unit
The arithmetic logic unit (ALU) is a crucial element of a computer's central processing unit (CPU).
The importance of hardware and device security terminology
Understanding hardware and device security terminology can help you improve your cybersecurity knowledge and keep malicious actors at bay.
Expand your technical know-how
The glossary contains the most common hardware and security terms. It’s a convenient tech dictionary for both newbies and professionals.
Safeguard against threats
Learning hardware and device terms can aid in evaluating the strength of your device cybersecurity and fortifying your defenses against cyberattacks.
Protect your gadgets
While hardware is harder to infect, it doesn’t mean hackers can’t get their hands to it. Learning how hardware and device security works will help to keep your devices safe.
Online security starts with a click.
Stay safe with the world’s leading VPN
Explore related articles
Explore related glossary categories
Can’t find an answer to your question?
Ask the questions that matter to you — and get answers from our cybersecurity experts.