{"id":28538,"date":"2025-10-30T23:02:14","date_gmt":"2025-10-30T23:02:14","guid":{"rendered":"https:\/\/www.adminbyrequest.com\/?page_id=28538"},"modified":"2026-01-24T21:41:45","modified_gmt":"2026-01-24T21:41:45","slug":"glossary-term-cybersecurity","status":"publish","type":"page","link":"https:\/\/www.adminbyrequest.com\/en\/glossary-term-cybersecurity","title":{"rendered":"Glossary Term: Cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"28538\" class=\"elementor elementor-28538\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f8e0801 e-flex e-con-boxed e-con e-parent\" data-id=\"f8e0801\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-57d62b02 e-con-full e-flex e-con e-child\" data-id=\"57d62b02\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-48703aec elementor-widget elementor-widget-heading\" data-id=\"48703aec\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><span style=\"black\">Glossary Term:<\/span> Cybersecurity<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a58fa5d elementor-widget elementor-widget-heading\" data-id=\"3a58fa5d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Elevated permissions that allow users to make system-level changes on computers and servers, such as installing software, modifying security settings, and accessing protected files. When users operate with permanent admin rights, any malware that infects their system automatically inherits those same elevated permissions.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1aabed0 e-flex e-con-boxed e-con e-parent\" data-id=\"1aabed0\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5168e5d e-con-full e-flex e-con e-child\" data-id=\"5168e5d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3005ed35 elementor-widget elementor-widget-heading\" data-id=\"3005ed35\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Visual Identity Guidelines<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-282abab elementor-widget elementor-widget-heading\" data-id=\"282abab\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Use this guide to correctly display our brand when partnering with Admin By Request,<\/br>or speaking about us in media and content.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1966c20f elementor-widget elementor-widget-text-editor\" data-id=\"1966c20f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"\/wp-content\/uploads\/2025\/07\/ABR-Brand-Guide-2025.pdf\">Download our Brand Guide<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Glossary Term: Cybersecurity Elevated permissions that allow users to make system-level changes on computers and servers, such as installing software, modifying security settings, and accessing protected files. When users operate with permanent admin rights, any malware that infects their system automatically inherits those same elevated permissions. Visual Identity Guidelines Use this guide to correctly display [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"ppma_author":[9],"class_list":["post-28538","page","type-page","status-publish","hentry","entry"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.6.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"Glossary Term: Cybersecurity Elevated permissions that allow users to make system-level changes on computers and servers, such as installing software, modifying security settings, and accessing protected files. When users operate with permanent admin rights, any malware that infects their system automatically inherits those same elevated permissions. Visual Identity Guidelines Use this guide to correctly display\" \/>\n\t<meta name=\"robots\" content=\"max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/www.adminbyrequest.com\/en\/glossary-term-cybersecurity\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.6.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Admin By Request \u00bb Local Admin Rights, Managed.\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Glossary Term: Cybersecurity \u00bb Admin By Request\" \/>\n\t\t<meta property=\"og:description\" content=\"Glossary Term: Cybersecurity Elevated permissions that allow users to make system-level changes on computers and servers, such as installing software, modifying security settings, and accessing protected files. When users operate with permanent admin rights, any malware that infects their system automatically inherits those same elevated permissions. Visual Identity Guidelines Use this guide to correctly display\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.adminbyrequest.com\/en\/glossary-term-cybersecurity\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2025-10-30T23:02:14+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2026-01-24T21:41:45+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adminbyrequest\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Glossary Term: Cybersecurity \u00bb Admin By Request\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Glossary Term: Cybersecurity Elevated permissions that allow users to make system-level changes on computers and servers, such as installing software, modifying security settings, and accessing protected files. When users operate with permanent admin rights, any malware that infects their system automatically inherits those same elevated permissions. Visual Identity Guidelines Use this guide to correctly display\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/glossary-term-cybersecurity#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/glossary-term-cybersecurity#listItem\",\"name\":\"Glossary Term: Cybersecurity\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/glossary-term-cybersecurity#listItem\",\"position\":2,\"name\":\"Glossary Term: Cybersecurity\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"name\":\"Home\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\",\"name\":\"Admin By Request\",\"description\":\"Local Admin Rights, Managed.\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"telephone\":\"+12622994600\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Circle-Tick-24.svg\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/glossary-term-cybersecurity\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/glossary-term-cybersecurity\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/adminbyrequest\",\"https:\\\/\\\/twitter.com\\\/AdminByRequest\",\"https:\\\/\\\/www.instagram.com\\\/AdminByRequest\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@adminbyrequest\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCwq1wlbT9m_z3YH-EPaZqKw\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/adminbyrequest\\\/\"]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/glossary-term-cybersecurity#webpage\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/glossary-term-cybersecurity\",\"name\":\"Glossary Term: Cybersecurity \\u00bb Admin By Request\",\"description\":\"Glossary Term: Cybersecurity Elevated permissions that allow users to make system-level changes on computers and servers, such as installing software, modifying security settings, and accessing protected files. When users operate with permanent admin rights, any malware that infects their system automatically inherits those same elevated permissions. Visual Identity Guidelines Use this guide to correctly display\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/glossary-term-cybersecurity#breadcrumblist\"},\"datePublished\":\"2025-10-30T23:02:14+00:00\",\"dateModified\":\"2026-01-24T21:41:45+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"name\":\"Admin By Request\",\"alternateName\":\"ABR\",\"description\":\"Local Admin Rights, Managed.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<script type=\"text\/javascript\">\n\t\t\t(function(c,l,a,r,i,t,y){\n\t\t\tc[a]=c[a]||function(){(c[a].q=c[a].q||[]).push(arguments)};t=l.createElement(r);t.async=1;\n\t\t\tt.src=\"https:\/\/www.clarity.ms\/tag\/\"+i+\"?ref=aioseo\";y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y);\n\t\t})(window, document, \"clarity\", \"script\", \"n4woz8og40\");\n\t\t<\/script>\n\t\t<script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https:\/\/www.googletagmanager.com\/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer',\"GTM-PGQ6572W\");<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Glossary Term: Cybersecurity \u00bb Admin By Request<\/title>\n\n","aioseo_head_json":{"title":"Glossary Term: Cybersecurity \u00bb Admin By Request","description":"Glossary Term: Cybersecurity Elevated permissions that allow users to make system-level changes on computers and servers, such as installing software, modifying security settings, and accessing protected files. When users operate with permanent admin rights, any malware that infects their system automatically inherits those same elevated permissions. Visual Identity Guidelines Use this guide to correctly display","canonical_url":"https:\/\/www.adminbyrequest.com\/en\/glossary-term-cybersecurity","robots":"max-snippet:-1, max-image-preview:large, max-video-preview:-1","keywords":"","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BreadcrumbList","@id":"https:\/\/www.adminbyrequest.com\/en\/glossary-term-cybersecurity#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","position":1,"name":"Home","item":"https:\/\/www.adminbyrequest.com\/en","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/glossary-term-cybersecurity#listItem","name":"Glossary Term: Cybersecurity"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/glossary-term-cybersecurity#listItem","position":2,"name":"Glossary Term: Cybersecurity","previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","name":"Home"}}]},{"@type":"Organization","@id":"https:\/\/www.adminbyrequest.com\/en\/#organization","name":"Admin By Request","description":"Local Admin Rights, Managed.","url":"https:\/\/www.adminbyrequest.com\/en\/","telephone":"+12622994600","logo":{"@type":"ImageObject","url":"\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","@id":"https:\/\/www.adminbyrequest.com\/en\/glossary-term-cybersecurity\/#organizationLogo"},"image":{"@id":"https:\/\/www.adminbyrequest.com\/en\/glossary-term-cybersecurity\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/adminbyrequest","https:\/\/twitter.com\/AdminByRequest","https:\/\/www.instagram.com\/AdminByRequest\/","https:\/\/www.tiktok.com\/@adminbyrequest","https:\/\/www.youtube.com\/channel\/UCwq1wlbT9m_z3YH-EPaZqKw","https:\/\/www.linkedin.com\/company\/adminbyrequest\/"]},{"@type":"WebPage","@id":"https:\/\/www.adminbyrequest.com\/en\/glossary-term-cybersecurity#webpage","url":"https:\/\/www.adminbyrequest.com\/en\/glossary-term-cybersecurity","name":"Glossary Term: Cybersecurity \u00bb Admin By Request","description":"Glossary Term: Cybersecurity Elevated permissions that allow users to make system-level changes on computers and servers, such as installing software, modifying security settings, and accessing protected files. When users operate with permanent admin rights, any malware that infects their system automatically inherits those same elevated permissions. Visual Identity Guidelines Use this guide to correctly display","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#website"},"breadcrumb":{"@id":"https:\/\/www.adminbyrequest.com\/en\/glossary-term-cybersecurity#breadcrumblist"},"datePublished":"2025-10-30T23:02:14+00:00","dateModified":"2026-01-24T21:41:45+00:00"},{"@type":"WebSite","@id":"https:\/\/www.adminbyrequest.com\/en\/#website","url":"https:\/\/www.adminbyrequest.com\/en\/","name":"Admin By Request","alternateName":"ABR","description":"Local Admin Rights, Managed.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"}}]},"og:locale":"en_US","og:site_name":"Admin By Request \u00bb Local Admin Rights, Managed.","og:type":"article","og:title":"Glossary Term: Cybersecurity \u00bb Admin By Request","og:description":"Glossary Term: Cybersecurity Elevated permissions that allow users to make system-level changes on computers and servers, such as installing software, modifying security settings, and accessing protected files. When users operate with permanent admin rights, any malware that infects their system automatically inherits those same elevated permissions. Visual Identity Guidelines Use this guide to correctly display","og:url":"https:\/\/www.adminbyrequest.com\/en\/glossary-term-cybersecurity","og:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","og:image:secure_url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","article:published_time":"2025-10-30T23:02:14+00:00","article:modified_time":"2026-01-24T21:41:45+00:00","article:publisher":"https:\/\/www.facebook.com\/adminbyrequest","twitter:card":"summary_large_image","twitter:site":"@AdminByRequest","twitter:title":"Glossary Term: Cybersecurity \u00bb Admin By Request","twitter:description":"Glossary Term: Cybersecurity Elevated permissions that allow users to make system-level changes on computers and servers, such as installing software, modifying security settings, and accessing protected files. When users operate with permanent admin rights, any malware that infects their system automatically inherits those same elevated permissions. Visual Identity Guidelines Use this guide to correctly display","twitter:creator":"@AdminByRequest","twitter:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg"},"aioseo_meta_data":{"post_id":"28538","title":"#post_title #separator_sa #site_title","description":"#post_content","keywords":null,"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"WebPage","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2026-01-24 22:28:32","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":null,"ai":{"faqs":[],"keyPoints":[],"titles":[],"descriptions":[],"socialPosts":{"email":[],"linkedin":[],"twitter":[],"facebook":[],"instagram":[]}},"created":"2025-10-30 23:01:23","updated":"2026-01-24 22:28:32"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tGlossary Term: Cybersecurity\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.adminbyrequest.com\/en"},{"label":"Glossary Term: Cybersecurity","link":"https:\/\/www.adminbyrequest.com\/en\/glossary-term-cybersecurity"}],"_links":{"self":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/pages\/28538","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/comments?post=28538"}],"version-history":[{"count":3,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/pages\/28538\/revisions"}],"predecessor-version":[{"id":28548,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/pages\/28538\/revisions\/28548"}],"wp:attachment":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media?parent=28538"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/ppma_author?post=28538"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}