FAQ - Frequently Asked Questions and Answers

The Internet is a global system of connections between electronic and computer devices. They can be interconnected in various ways within telecommunications infrastructure, but all use a common, standardized set of protocols.

The Internet is delivered through various physical media. The key methods of connecting an end user to the Internet include:

  • Fiber optic – using thin glass fibers to transmit data through light waves.
  • Cable – using wired (copper) connections to transmit data through electrical charges.
  • Wi-Fi – using radio waves in the 2.4 GHz, 5 GHz, and 6 GHz bands to extend the Internet connection delivered by another medium (e.g., fiber).
  • Cellular networks – using mobile networks in 3G, 4G/LTE, and 5G technologies to transmit data via radio waves.
  • Radio link – using antennas operating in frequency bands dedicated for public use, not requiring a license, to transmit data via radio waves.
  • Satellite connection – using antennas to connect to a satellite system providing service through radio waves.

Link availability is a measure of how long the Internet or specific connections work without interruptions and remain accessible to the end user.

Redundancy is a method of increasing system reliability by using additional, backup elements. In the case of an Internet link, it means having a secondary device or connection that takes over when the primary one fails.

Link bandwidth is a measure of how much data (e.g., pictures) can be transmitted/delivered through the connection within a given time frame.

SaaS (Software-as-a-Service) is a model of delivering applications to the end user through the provider’s cloud infrastructure. The provider is responsible for maintaining the entire infrastructure, while the customer purchases access to the ready-to-use application.

A public IP address is a unique identification number under which our device or devices are recognized on the global Internet. A static IP address means that its value does not change, regardless of time passing or device restarts.

A firewall is a security system that protects a computer or network from unwanted connections from public and private networks.

UTM (Unified Threat Management) is a device or system that combines multiple security mechanisms, such as firewall, anti-spam, and intrusion prevention systems, into one unified solution.

DDoS (Distributed Denial of Service) is a cyberattack that overloads a server or online service by using a large number of requests from many infected devices operating and controlled simultaneously (a so-called “botnet”). The targeted device is “flooded,” and the overload may result in slowed performance, partial unavailability, or a complete shutdown, preventing access for legitimate users.

Anti-DDoS protection works by detecting when someone tries to flood a website or server with a huge number of fake connections. Such harmful sources are automatically blocked so that regular users can continue to use the service without issues.

VPN (Virtual Private Network) is a secure “tunnel” that allows users from remote locations to connect to a local home or company network. Security is ensured through encryption, making information exchange inaccessible to outsiders.

LAN (Local Area Network) is a local network, e.g., in a home, office, or school. It connects computers and devices within a small area.

WAN (Wide Area Network) is a wide-area network that covers large regions, such as cities, countries, or the entire world. The largest WAN is the Internet.

Wi-Fi is a method of wireless Internet connection. The connection is established not with cables, but with radio signals.

It is a special room or building where servers storing data and applications are located. Adequate power supply, cooling, and above all, physical security of equipment and data are ensured.

It is a dedicated space for a single client, e.g., a slot in a rack or part of a server room. This ensures that equipment and data are separated from other clients.

It is an organized system of cables and sockets in a building that enables easy connection of computers, phones, and other devices to the network.

It is a copy of data created in case of power failure, data loss, or an attack. Thanks to backup, files that could have been lost or damaged can be restored.

It is a service where the client has access to an entire physical server exclusively. This provides greater system administration capabilities, independence, and full computing power of the resources.

Data migration is the process of transferring data from one resource to another. This can be a migration from one server/system to another (e.g., when purchasing a device with better parameters) or from one format to another (e.g., from an old database to a new one with a different structure).

Traditional WAN architecture is hardware-defined. SD-WAN is an extension of WAN but is software-defined. This allows companies to more easily control connections between branches, choose the best data paths, and react faster to problems.

These are actions carried out by specialists to simulate attacks on a system or network to verify configuration and cybersecurity. The goal of penetration tests is to detect security gaps and vulnerabilities in the network that could threaten the safety of systems, data, and users.

Network traffic management involves controlling data flow and defining rules for managing traffic in a way that ensures the network operates as quickly as possible with minimal delays.

Antivirus software protects a computer against known malicious software. It detects and removes viruses before they can damage the system.

Anti-malware is an extension of antivirus software – it protects against threats such as Trojans or spyware, not just computer viruses.

SmartWork is an ICT Future service based on Ubiquity solutions, offering broad capabilities for running a business by integrating key technologies such as video surveillance, access control, network security, Wi-Fi management, and network switches. This advanced solution allows centralized management of network infrastructure, resulting in greater efficiency and security.

An audit is the inspection of systems, processes, or a company for security, quality, or regulatory compliance, carried out by certified specialists or organizations.

SOC (Security Operations Center) is an IT security center that continuously (24/7) monitors and responds to threats in a company’s or client’s network.