Do you know your 'RAM' from your 'ROM' or your 'Bits' from you 'Bytes'?

Glossary of IT, Computing and Cyber Security Terms

Enter a word or phrase below to find out what it means:

AI
Artificial Intelligence is a field of computer science that focuses on creating machines or software that can perform tasks that normally require human intelligence, such as perception, reasoning, learning, or decision-making.
API
Application Programming Interface is a set of protocols, routines, and tools for building software applications or services, often used for integrating or extending the functionality of existing systems or platforms.
Backup
Backup is the process of creating copies or archives of data or files, often used for protecting against data loss or corruption, and for restoring data to a previous state or version.
Bandwidth
Bandwidth is the capacity or speed of a network or communication channel to transmit data, often measured in bits or bytes per second, and affected by factors such as distance, congestion, or interference.
Cache
Cache is a component or mechanism that stores frequently accessed or recently used data or files, often used for improving the performance or efficiency of a system, application, or website.
Cloud Computing
Cloud Computing is a model of delivering computing resources or services, such as storage, processing, or software, over the internet or a network, often used for reducing costs, improving scalability, and enabling access from anywhere and any device.
Cybersecurity
Cybersecurity is the practice of protecting computer systems, networks, and data from unauthorized access, use, disclosure, disruption, modification, or destruction, often through a combination of technologies, processes, and policies.
Encryption
Encryption is the process of converting plain text or data into a coded or unreadable format, often used for securing data, messages, or transactions, and for ensuring confidentiality, integrity, and authenticity.
Firewall
A Firewall is a network security device that monitors and filters incoming or outgoing traffic based on predefined rules or policies, often used for blocking or allowing specific ports, protocols, or IP addresses, and for preventing unauthorized access or malware infections.
Hacker
A Hacker is an individual or group that uses computer or network skills to gain unauthorized access, manipulate, or steal data or resources, often with a malicious or criminal intent, although the term can also refer to ethical or white hat hackers who use their skills for testing, improving, or securing systems.
API
Application Programming Interface is a set of protocols, routines, and tools for building software applications, often used for integrating different systems or services, exchanging data, or automating tasks.
CLI
Command Line Interface is a way of interacting with a computer program or system by typing text commands, often used for performing advanced or repetitive tasks, or for accessing features that are not available through a graphical user interface.
DNS
Domain Name System is a hierarchical and decentralized naming system that translates domain names into IP addresses, often used for resolving the location of web pages, email servers, or other network services.
FTP
File Transfer Protocol is a standard network protocol for transferring files between computers, often used for sharing files, uploading or downloading content, or managing website content.
HTTP
Hypertext Transfer Protocol is an application protocol for transferring data on the World Wide Web, often used for fetching resources, such as HTML pages, images, or videos, from web servers to web browsers.
HTTPS
Hypertext Transfer Protocol Secure is an extension of HTTP that uses encryption and authentication to secure web traffic, often used for protecting sensitive information, such as passwords, credit card numbers, or personal data.
Encryption
Encryption is a process of converting plaintext or readable data into a coded or unreadable format, known as ciphertext, using mathematical algorithms or keys, often used for protecting sensitive or confidential data, and ensuring data integrity and privacy.
Decryption
Decryption is a process of converting ciphertext or encrypted data into its original plaintext or readable format, using a secret key or algorithm, often used for accessing or restoring encrypted data, and verifying its authenticity and integrity.
Phishing
Phishing is a type of social engineering attack that involves sending fraudulent or deceptive emails, messages, or websites to trick users into revealing sensitive information, such as passwords, credit card details, or personal data, often used for identity theft, fraud, or extortion.
Adware
Adware is a type of software that automatically displays or downloads advertisements on a user's computer or device, often used for generating revenue or promoting products or services, but can also slow down the system or compromise the user's privacy.
Backdoor
A Backdoor is a hidden or undocumented entry or vulnerability in a computer system, application, or device, that allows unauthorized or remote access or control, often used for maintaining access, stealing data, or launching attacks.
Bug
A Bug is a coding error, flaw, or defect in a software or system that causes unexpected or incorrect behavior, such as crashes, freezes, or security vulnerabilities, often used for debugging or testing, but can also pose serious risks or issues for users.
Server
A Server is a computer program, device, or system that provides various services or resources to other computers or users, such as file sharing, email, web hosting, or database management, often used for centralizing and streamlining operations or data storage.
Social Engineering
Social Engineering is a tactic that relies on psychological manipulation and deception to trick people into divulging confidential information, performing an action, or compromising their security, often used for gaining unauthorized access, stealing data, or spreading malware or spam.
Spam
Spam is unsolicited or unwanted electronic messages, such as email, text messages, or instant messages, that are sent in bulk and often contain advertising, phishing, or malware, often used for promoting or selling products, spreading scams, or harvesting personal information.
Spyware
Spyware is a type of software that is designed to gather information about a computer user or system without their knowledge or consent, often used for tracking online activity, stealing sensitive data, or displaying unwanted ads or pop-ups.
Trojan
A Trojan, or Trojan Horse, is a type of malware that disguises itself as a legitimate program or file and tricks users into installing or executing it, often used for stealing data, granting remote access, or causing damage to the system.
Virtualization
Virtualization is a technology that enables multiple operating systems, applications, or resources to run on a single physical machine or server, often used for maximizing hardware utilization, simplifying management, and enhancing security and availability.
VPN
Virtual Private Network is a technology that allows users to securely access a private network over a public network, such as the internet, often used for protecting sensitive data, bypassing restrictions, or connecting remote offices or workers.
WAF
Web Application Firewall is a type of firewall that is designed to protect web applications from attacks, such as cross-site scripting, SQL injection, or file inclusion, often used for blocking or filtering malicious traffic and requests, and for preventing data breaches or downtime.
WAN
Wide Area Network is a type of computer network that covers a large geographical area, such as a country or a continent, and connects multiple local area networks, often used for enabling communication, data exchange, and resource sharing, among geographically dispersed users and devices.
FTTP
Fiber To The Premises is a type of broadband internet connection that uses fiber-optic cables to deliver data directly to homes or buildings, often offering high-speed and reliable connectivity, but requires significant infrastructure and deployment costs.
FTTC
Fiber To The Curb is a type of broadband internet connection that uses fiber-optic cables to a street cabinet and then copper wires to deliver data to homes or buildings, often offering faster speeds than traditional ADSL, but can be limited by distance from the cabinet and quality of the copper wires.
VoIP
Voice over Internet Protocol is a technology that allows voice communication and multimedia sessions over the Internet, often used for reducing costs, improving flexibility, and enhancing collaboration.
SaaS
Software as a Service is a software delivery model that provides applications over the internet, often used for reducing the cost and complexity of software deployment, improving accessibility, and ensuring scalability.
DLP
Data Loss Prevention is a set of technologies and policies that aim to protect sensitive information from unauthorized access, use, disclosure, or destruction, often used for preventing data breaches, complying with regulations, and safeguarding intellectual property.
IaaS
Infrastructure as a Service is a cloud computing model where a provider offers virtualized computing resources, such as servers, storage, and networking, on-demand over the internet, allowing users to deploy and manage their own applications and data in a flexible and scalable manner.
PaaS
Platform as a Service is a cloud computing model where a provider offers a development platform, such as operating system, middleware, database, or runtime environment, on-demand over the internet, allowing users to build and deploy their own applications without managing the underlying infrastructure.
DaaS
Desktop as a Service is a cloud computing model where a provider offers a virtual desktop environment, such as a Windows or a Linux desktop, on-demand over the internet, allowing users to access their own desktop, applications, and data from any device with an internet connection, without managing the hardware or the software.
DBaaS
Database as a Service is a cloud computing model where a provider offers a managed database platform, such as a relational or a NoSQL database, on-demand over the internet, allowing users to store, process, and manage their own data in a secure and scalable manner, without setting up or maintaining the database infrastructure.
Buffer Overflow
Buffer Overflow is a type of software vulnerability that occurs when a program or process tries to store more data in a buffer than it can handle, allowing an attacker to overwrite adjacent memory and execute arbitrary code or crash the program or system.
Certificate Authority
A Certificate Authority is a trusted entity that issues digital certificates to verify the identity of users, devices, or services on a network, and enables secure communication using encryption and authentication mechanisms.
Cyber Espionage
Cyber Espionage is the practice of using digital technology to gather sensitive or confidential information from individuals, organizations, or governments, often for political, economic, or military purposes, and can involve activities such as hacking, phishing, or malware attacks.
Data Breach
A Data Breach is an incident in which sensitive or confidential information is exposed, accessed, or stolen by unauthorized parties, such as hackers, insiders, or human error, and can result in financial losses, legal liabilities, or reputational damage.
Denial-of-Service (DoS)
Denial-of-Service (DoS) is a type of cyber attack that aims to disrupt or disable the normal operations of a system, network, or service, by overwhelming it with traffic, requests, or messages, often using botnets, amplification, or reflection techniques.
Digital Forensics
Digital Forensics is the practice of collecting, analyzing, and presenting digital evidence in a legal or investigative context, such as computer crimes, data breaches, or intellectual property theft, using specialized tools, techniques, and expertise.
Exploit
An Exploit is a piece of software or code that takes advantage of a vulnerability or weakness in a system, application, or device, to gain unauthorized access, control, or information, and can be used for various purposes, such as spying, stealing, or disrupting.
Hacker
A Hacker is an individual who uses their technical skills and knowledge to identify, exploit, or fix vulnerabilities or weaknesses in computer systems, networks, or applications, and can have different motives, such as curiosity, activism, or criminal activity.
DMZ
Demilitarized Zone is a network segment that is isolated from the internal network and exposed to the public internet, often used for hosting public-facing services, such as web servers, while enforcing stricter security controls, such as firewall rules or intrusion prevention systems, to protect the internal network from external threats.
Honeypot
A Honeypot is a decoy system or application that is designed to attract and trap attackers, often used for gathering intelligence on their tactics, techniques, and procedures, and for delaying or diverting their attacks away from the real targets, such as critical infrastructure or sensitive data.
Identity and Access Management (IAM)
Identity and Access Management is a framework or system that manages the identities, privileges, and authentication of users, devices, and applications in an organization, often used for enforcing security policies, such as role-based access control or multi-factor authentication, and for reducing the risk of unauthorized access or data breaches.
Intrusion Detection System (IDS)
An Intrusion Detection System is a type of security software or hardware that monitors network traffic or system logs for signs of unauthorized activity or malicious behavior, often used for detecting and alerting security incidents in real-time, and for preventing or mitigating the impact of cyber attacks.
Intrusion Prevention System (IPS)
An Intrusion Prevention System is a type of security software or hardware that actively blocks or mitigates network or system threats, such as viruses, worms, or denial-of-service attacks, often used for complementing or replacing traditional firewalls, and for reducing the risk of successful cyber attacks.
Man-in-the-Middle (MitM) Attack
A Man-in-the-Middle Attack is a type of cyber attack in which an attacker intercepts or alters communication between two parties, often used for eavesdropping, data theft, or unauthorized access, and requires the attacker to be able to intercept the traffic and impersonate both parties without being detected.
Patch Management
Patch Management is a process or system that manages and deploys updates, patches, or hotfixes for software or firmware, often used for fixing vulnerabilities or bugs, and for improving performance or stability, and requires a systematic and timely approach to minimize the risk of unpatched or outdated systems.
Penetration Testing
Penetration Testing is a type of security testing or assessment that simulates a real-world cyber attack on a system or network, often used for identifying vulnerabilities, misconfigurations, or weaknesses, and for measuring the effectiveness of security controls, such as firewalls, intrusion detection systems, or access controls.
Security Information and Event Management (SIEM)
Security Information and Event Management is a type of software that aggregates and analyzes security data from various sources, such as network devices, servers, or applications, and generates alerts or reports on security incidents, often used for detecting and responding to cyber threats in real-time.
Penetration Testing
Penetration Testing is a type of security assessment that attempts to simulate an attack on a system, network, or application, with the goal of identifying and exploiting vulnerabilities or weaknesses, often used for testing the effectiveness of security controls, processes, and policies.
Red Team
Red Team is a group of security professionals who simulate attacks on a system, network, or organization, with the goal of identifying and exploiting vulnerabilities or weaknesses, often used for testing the effectiveness of security controls, processes, and policies, and for improving the overall security posture.
Security Information and Event Management (SIEM)
Security Information and Event Management is a type of software that aggregates and analyzes security data from various sources, such as network devices, servers, or applications, and generates alerts or reports on security incidents, often used for detecting and responding to cyber threats in real-time.
Threat Intelligence
Threat Intelligence is information about the tactics, techniques, and procedures of cyber threats, as well as the context, motivations, and capabilities of threat actors, often used for improving the awareness, understanding, and response to cyber threats.
Virtual Private Network (VPN)
Virtual Private Network is a technology that allows users to securely access a private network over a public network, such as the internet, often used for protecting sensitive data, bypassing restrictions, or connecting remote offices or workers.
Vulnerability Assessment
Vulnerability Assessment is a type of security assessment that identifies and prioritizes vulnerabilities or weaknesses in a system, network, or application, often used for reducing the risk of cyber attacks, data breaches, or downtime, and for complying with security regulations or standards.
Web Application Firewall (WAF)
Web Application Firewall is a type of firewall that is designed to protect web applications from attacks, such as cross-site scripting, SQL injection, or file inclusion, often used for blocking or filtering malicious traffic and requests, and for preventing data breaches or downtime.
Zero Day
A Zero Day is a type of vulnerability or exploit that is unknown or unpatched by the software vendor or security community, and can be used by cyber criminals or hackers for launching attacks, often used for gaining unauthorized access, stealing data, or damaging systems.
Security Operations Center (SOC)
Security Operations Center is a central facility that houses an information security team responsible for monitoring, detecting, analyzing, and responding to security incidents across an organization's network and systems.
Security Information and Event Management (SIEM)
Security Information and Event Management is a type of software that aggregates and analyzes security data from various sources, such as network devices, servers, or applications, and generates alerts or reports on security incidents, often used for detecting and responding to cyber threats in real-time.
Security Orchestration, Automation, and Response (SOAR)
Security Orchestration, Automation, and Response is a technology that combines security tools, workflows, and intelligence to automate incident response processes and improve efficiency, accuracy, and consistency of security operations.
Business Continuity and Disaster Recovery (BCDR)
Business Continuity and Disaster Recovery is a set of processes, policies, and procedures that ensure the continued availability and functionality of critical business operations and IT systems in the event of disruptive events, such as natural disasters, cyber attacks, or human errors.
Digital Forensics and Incident Response (DFIR)
Digital Forensics and Incident Response is a discipline that involves the collection, analysis, and preservation of digital evidence from computer systems, networks, and devices to investigate and identify the cause, scope, and impact of security incidents or data breaches.
OneDrive
OneDrive is a cloud-based file hosting service offered by Microsoft. It allows users to store, share, and sync files across devices and access them from anywhere with an internet connection.
SharePoint
SharePoint is a web-based collaboration and document management platform offered by Microsoft. It allows users to create, manage, and share content and applications with others in their organization.
Teams
Teams is a collaborative platform offered by Microsoft that allows users to communicate and collaborate with others in real-time. It offers features such as messaging, video conferencing, file sharing, and project management.
Zoom
Zoom is a cloud-based video conferencing platform that allows users to host and attend virtual meetings, webinars, and other online events. It offers features such as screen sharing, recording, and virtual backgrounds.
Video Conferencing
Video conferencing is a technology that allows individuals or groups to conduct live meetings, presentations, or discussions over the internet. It can be used for remote work, virtual learning, or online events and can be facilitated by various platforms and devices.
Facebook
Facebook is a social networking platform that allows users to create profiles, share content, connect with friends, and join groups or events. It also offers features such as messaging, live streaming, marketplace, and advertising, and has over 2.8 billion monthly active users as of 2021.
Twitter
Twitter is a microblogging platform that allows users to post and interact with messages, known as tweets, that are limited to 280 characters. It also offers features such as retweets, hashtags, mentions, and direct messages, and has over 353 million monthly active users as of 2021.
TikTok
TikTok is a video-sharing platform that allows users to create and watch short-form videos, ranging from 15 to 60 seconds, that are set to music or other audio. It also offers features such as filters, effects, duets, and challenges, and has over 1 billion monthly active users as of 2021.
Instagram
Instagram is a photo and video-sharing platform that allows users to post, edit, and share visual content, such as pictures, stories, reels, and IGTV. It also offers features such as filters, hashtags, mentions, and direct messages, and has over 1.25 billion monthly active users as of 2021.
LinkedIn
LinkedIn is a professional networking platform that allows users to create profiles, showcase their skills and experience, connect with colleagues and peers, and search for jobs or employees. It also offers features such as groups, articles, messaging, and advertising, and has over 740 million registered users as of 2021.
Snapchat
Snapchat is a multimedia messaging platform that allows users to send and receive photos and videos, known as snaps, that disappear after a certain time or viewing. It also offers features such as filters, lenses, stories, and discover, and has over 500 million monthly active users as of 2021.
Lan
Local Area Network is a computer network that interconnects devices within a limited geographical area, such as a home, office, or building, and uses various technologies, such as Ethernet, Wi-Fi, or Bluetooth, to enable communication and resource sharing.
Router
A Router is a networking device that forwards data packets between computer networks, such as the Internet, and performs various functions, such as traffic management, network security, or wireless access, by using routing tables and protocols.
Network switch
A Network Switch is a networking device that connects devices within a Local Area Network and enables them to communicate with each other by forwarding data packets between them, and can also perform various functions, such as traffic filtering, quality of service, or virtual LANs.
ADSL
Asymmetric Digital Subscriber Line is a type of digital telecommunications technology that enables high-speed data transmission over existing copper telephone lines, and provides faster download speeds than upload speeds, often used for internet access and multimedia streaming.
VDSL
Very-high-bit-rate Digital Subscriber Line is a type of digital telecommunications technology that enables ultra-high-speed data transmission over existing copper telephone lines, and provides faster download and upload speeds than ADSL, often used for internet access, video conferencing, or cloud computing.
3-2-1 Rule of Backups
The 3-2-1 Rule is a best practice for data backup that involves creating three copies of data, storing the copies on two different types of media, and keeping one copy offsite to protect against physical disasters or theft.
API
Application Programming Interface is a set of protocols, routines, and tools for building software applications, often used for integrating different software systems and services.
Adware
Advertising-supported Software is a type of software that displays advertisements to users, often bundled with other software.
Artificial Intelligence (AI)
Artificial Intelligence is a field of computer science that focuses on creating intelligent machines that can perform tasks that typically require human intelligence, such as learning, problem-solving, and decision-making.
Bitlocker
Bitlocker is a full-disk encryption feature included in Microsoft Windows that can protect data from unauthorised access by encrypting the entire disk drive.
Botnet
A Botnet is a network of infected computers or devices that can be remotely controlled to carry out malicious activities, such as spreading malware, stealing data, or launching DDoS attacks.
Bring Your Own Device (BYOD)
Bring Your Own Device is a policy that allows employees to use their personal devices, such as smartphones, laptops, and tablets, for work purposes, often used for improved productivity and flexibility.
Bug
A Bug is an error or flaw in a software program that causes it to behave unexpectedly or to produce incorrect results, often used for describing unintentional defects in code.
BYOC
Bring Your Own Cloud is a practice that allows employees to use their personal cloud storage or file-sharing services, such as Dropbox, Google Drive, or iCloud, for work purposes, often used for improved collaboration and accessibility.
Cache
Cache is a type of computer memory that is used to store frequently accessed data for rapid access, often used for improving performance and responsiveness.
Certificate Authority (CA)
A Certificate Authority is a trusted entity that issues digital certificates, which are used to verify the identity of users, devices, or organizations in electronic transactions or communications.
Cloud Computing
Cloud Computing is a model for delivering on-demand access to shared computing resources, such as servers, storage, applications, and services, over a network, often used for scalability, flexibility, and cost optimization.
Computer Virus
A Computer Virus is a type of malware that self-replicates by infecting other programs or files, often used for causing damage, stealing data, or gaining unauthorised access.
CPU
Central Processing Unit is the primary component of a computer that performs most of the processing and control tasks, often referred to as the brain of the computer.
CRM
Customer Relationship Management is a software application that manages a company's interactions with customers, clients, and sales prospects, often used for improving customer satisfaction, retention, and loyalty.
Cross-Site Scripting (XSS)
Cross-Site Scripting is a type of web vulnerability that allows attackers to inject malicious code into web pages viewed by other users, often used for stealing sensitive data, executing phishing attacks, or spreading malware.
Cryptocurrency
Cryptocurrency is a digital or virtual currency that uses cryptography for security and verification, and operates independently of a central bank or government, often used for decentralised and anonymous transactions.
Data Breach
A Data Breach is a security incident in which sensitive, protected, or confidential data is accessed or disclosed without authorization, often used for identity theft, financial fraud, or corporate espionage.
Data Encryption
Data Encryption is the process of converting plain text or data into a code or cipher that can only be read by authorised parties, often used for ensuring confidentiality, integrity, and authenticity of information.
Data Leak
A Data Leak is a security incident in which sensitive or confidential data is disclosed to unauthorised parties, often used for exposing personal information, trade secrets, or intellectual property.
Data Loss Prevention (DLP)
Data Loss Prevention is a set of tools, policies, and procedures for preventing data loss or theft by monitoring, detecting, and blocking sensitive data in transit, at rest, or in use, often used for complying with data protection regulations or industry standards.
Data Recovery
Data Recovery is the process of restoring lost, damaged, or corrupted data from backup or storage media, often used for recovering from hardware failures, software errors, or natural disasters.
Distributed Denial of Service (DDoS)
Distributed Denial of Service is a type of cyber attack that involves overwhelming a network, system, or application with a flood of traffic or requests from multiple sources, often used for disrupting service, extorting money, or carrying out revenge.
Deep Learning
Deep Learning is a subset of machine learning that involves training artificial neural networks with multiple layers to analyze and recognize patterns in data, often used for speech recognition, image classification, or natural language processing.
DevOps
DevOps is a set of practices that combines software development and IT operations to improve collaboration, automation, and feedback between teams, often used for delivering software faster, more reliably, and at lower cost.
DNS
Domain Name System is a hierarchical naming system that translates domain names, such as www.example.com, into IP addresses, such as 192.0.2.1, to locate and access network resources, often used for simplifying and memorizing internet addresses.
Drive-by Download
A Drive-by Download is a type of web-based attack that infects a computer or device by exploiting vulnerabilities in software or web browsers, often used for delivering malware, spyware, or adware without the user's knowledge or consent.
Endpoint Detection and Response (EDR)
Endpoint Detection and Response is a category of security tools that use advanced analytics to detect and respond to cyber threats at the endpoint level, often used for identifying and blocking malicious activities, such as fileless attacks, ransomware, or data exfiltration.
Encryption
Encryption is the process of encoding information in a way that only authorised parties can read it, often used for securing data in transit, at rest, or in use, by converting plain text or data into a code or cipher.
Enterprise Architecture (EA)
Enterprise Architecture is a practice of designing and managing the structure, processes, information, and technology of an organization, often used for aligning business goals, strategy, and operations with IT capabilities and resources.
Firmware
Firmware is a type of software that is embedded in a hardware device, such as a computer, smartphone, or router, and controls its basic functions and features, often used for providing low-level control and interfacing with other components.
Hacker
A Hacker is a person who uses their computer skills and knowledge to gain unauthorised access to computer systems, networks, or data, often used for stealing, modifying, or deleting information, or for causing disruption or damage.
HDMI
High-Definition Multimedia Interface is a digital audio/video interface that transmits uncompressed video and audio data between devices, often used for connecting computers, game consoles, and other devices to high-definition displays, such as TVs or projectors.
Honeypot
A Honeypot is a decoy system or network that is designed to attract and trap cyber attackers, often used for studying and analyzing their tactics, techniques, and procedures, or for diverting their attention from real targets.
HTTPS
Hypertext Transfer Protocol Secure is a protocol for secure communication over the internet, often used for encrypting and authenticating data between web browsers and servers, by using digital certificates and the SSL/TLS cryptographic protocol.
Immutable Backups
Immutable Backups are copies of data or applications that are stored in a way that prevents them from being modified or deleted, often used for protecting against accidental or intentional data loss, such as ransomware attacks, system failures, or human errors.
Internet of Things (IoT)
Internet of Things is a network of physical devices, vehicles, home appliances, and other items that are embedded with sensors, software, and connectivity, allowing them to collect and exchange data, often used for automation, optimization, and innovation in various industries.
Keylogger
A Keylogger is a type of malware or hardware device that records the keystrokes of a computer or mobile device, often used for stealing sensitive data, such as passwords, credit card numbers, or personal messages.
Machine Learning (ML)
Machine Learning is a subset of artificial intelligence that involves training algorithms to recognize patterns and make predictions based on data, often used for image and speech recognition, natural language processing, and data analysis.
Malware
Malware is a type of software that is designed to harm or exploit computer systems, networks, or users, often used for stealing data, disrupting operations, or gaining unauthorised access, and includes viruses, worms, Trojans, adware, and spyware.
Managed Detection and Response (MDR)
Managed Detection and Response is a type of security service that provides continuous monitoring, analysis, and response to cyber threats, often used for detecting and containing advanced and persistent attacks, such as APTs, zero-days, or fileless malware.
Multi-Factor Authentication (MFA)
Multi-Factor Authentication is a security process that requires users to provide two or more forms of identification, such as passwords, tokens, biometrics, or smart cards, to access a system, network, or application, often used for reducing the risk of unauthorised access or data loss.
Network
A Network is a collection of devices, such as computers, servers, routers, and switches, that are connected together to share resources, data, and services, often used for communication, collaboration, and information exchange.
Open Source
Open Source refers to software or hardware that is available for use, modification, and distribution by anyone, without restrictions or licensing fees, often used for promoting collaboration, innovation, and community development.
OS
Operating System is a software program that manages the hardware resources and services of a computer, and provides a platform for running applications and user interfaces, often used for performing basic functions, such as memory allocation, process management, and file storage.
Patch
A Patch is a software update that fixes a bug, vulnerability, or performance issue in an application, operating system, or device, often used for improving security, stability, or functionality.
Ransomware
Ransomware is a type of malware that encrypts the files or systems of a computer or network, and demands a ransom payment in exchange for the decryption key, often used for extorting money, disrupting operations, or stealing data.
RAID
Redundant Array of Independent Disks is a data storage technology that uses multiple hard drives to improve performance, availability, or fault tolerance, often used for protecting against data loss, hardware failures, or other disasters.
RAM
Random Access Memory is a type of computer memory that allows data to be read or written in any order, and provides temporary storage for the operating system, applications, and user data, often used for improving the speed and responsiveness of a system.
Rootkit
A Rootkit is a type of malware that is designed to hide its presence and actions from the operating system, antivirus software, or system administrators, often used for gaining persistent access, stealing data, or controlling a system.
SaaS
Software as a Service is a model of software delivery in which applications are hosted on a remote server and accessed through the internet, often used for providing scalable, flexible, and cost-effective solutions, without the need for on-premises infrastructure or maintenance.
SCADA
Supervisory Control and Data Acquisition is a type of control system that monitors and manages industrial processes, such as manufacturing, energy, or transportation, often used for optimizing performance, efficiency, and safety.
SCCM
System Center Configuration Manager is a software application that is used to manage and deploy operating systems, software, and updates to computers and devices in an enterprise environment, often used for automating and streamlining IT tasks and processes.
Server
A Server is a computer or program that provides services or resources to other computers or clients, such as web hosting, file sharing, or email, often used for enabling remote access, collaboration, and data exchange.
Social Engineering
Social Engineering is a technique of manipulating or deceiving people into performing actions or disclosing information that is normally confidential or sensitive, often used for gaining unauthorised access, stealing data, or launching cyber attacks, such as phishing, pretexting, or baiting.
SSD
Solid State Drive is a type of computer storage that uses NAND-based flash memory to store data, and has no moving parts, often used for faster boot-up times, data access, and application performance, and for lower power consumption, noise, and heat generation.
SSL
Secure Sockets Layer is a cryptographic protocol that is used to secure the communication between web browsers and servers, by encrypting and authenticating data, often used for protecting sensitive information, such as credit card numbers, login credentials, or personal data.
USB
Universal Serial Bus is a common interface for connecting devices to a computer, such as keyboards, mice, printers, or external storage, often used for fast data transfer, easy installation, and hot-swapping, without the need for specialised drivers or hardware.
VGA
Video Graphics Array is a standard for displaying images and videos on a computer monitor or TV screen, using an analog signal, often used for legacy devices or systems, and for resolutions of up to 640x480 pixels.
Virus
A Virus is a type of malware that spreads by copying itself and infecting other files or systems, often used for disrupting operations, stealing data, or damaging files, and requires a host program or file to run.
Virtualization
Virtualization is a technology that enables multiple operating systems, applications, or resources to run on a single physical machine or server, often used for maximizing hardware utilization, simplifying management, and enhancing security and availability.
VPN
Virtual Private Network is a technology that allows users to securely access a private network over a public network, such as the internet, often used for protecting sensitive data, bypassing restrictions, or connecting remote offices or workers.
WAF
Web Application Firewall is a type of firewall that is designed to protect web applications from attacks, such as cross-site scripting, SQL injection, or file inclusion, often used for blocking or filtering malicious traffic and requests, and for preventing data breaches or downtime.
WAN
Wide Area Network is a type of computer network that covers a large geographical area, such as a country or a continent, and connects multiple local area networks, often used for enabling communication, data exchange, and resource sharing, among geographically dispersed users and devices.
Worm
A Worm is a type of malware that replicates itself and spreads through networks or devices, often used for consuming bandwidth, stealing data, or overloading systems, and does not require a host program or file to run.
Extended Detection and Response (XDR)
Extended Detection and Response is a type of security solution that integrates and correlates data from various sources, such as endpoints, network, cloud, or applications, and provides automated detection, investigation, and response to cyber threats, often used for improving visibility, context, and efficiency.
2FA
Two-Factor Authentication is a security process that requires users to provide two forms of identification, such as a password and a security token, to access a system, network, or application, often used for reducing the risk of unauthorised access or data loss.
802.11
802.11 is a set of standards for wireless local area networks, also known as Wi-Fi, that specifies the protocols, frequencies, and data rates for wireless communication, often used for enabling mobile connectivity, internet access, and multimedia streaming.
802.1x
802.1x is a standard for network access control that provides authentication and authorization for devices and users, often used for enforcing security policies, such as restricting access to sensitive data or resources.
802.3
802.3 is a standard for wired local area networks, also known as Ethernet, that specifies the protocols, media, and data rates for data transmission, often used for connecting devices, such as computers, servers, or printers, to a network.
Bit
The smallest unit of digital information, representing a single binary value of either 0 or 1.
Byte
A group of 8 bits, used to represent a single character, such as a letter or number, or a small amount of binary data.
Gigabyte
A unit of digital information equal to 1 billion bytes, often used to measure the capacity of storage devices, such as hard drives, solid state drives, or USB drives.
Terabyte
A unit of digital information equal to 1 trillion bytes, or 1,000 gigabytes, often used to measure the capacity of large storage systems, such as data centers, cloud storage, or high-end workstations.
ROM
Read-Only Memory is a type of computer memory that stores data permanently and cannot be modified or erased by the user, often used for storing firmware, software, or operating system code that is critical to the functioning of a device or system.
DVD
Digital Versatile Disc is a type of optical storage media that can store large amounts of digital data, such as video, audio, or software, often used for distributing movies, music, or games, and for backup or archiving purposes.
Spear Phishing
Spear Phishing is a type of cyber attack that targets a specific individual or organization by sending them personalized and convincing messages, often using social engineering tactics, to trick them into revealing sensitive information or clicking on a malicious link or attachment.
Whaling
Whaling is a type of cyber attack that targets high-profile individuals or executives in an organization by using impersonation, deception, or social engineering tactics, to trick them into disclosing sensitive information or authorizing fraudulent transactions, often with significant financial or reputational damage.
Vishing
Vishing is a type of cyber attack that uses voice or phone calls to impersonate legitimate organizations or individuals, often using social engineering tactics, to trick the victims into revealing sensitive information, such as passwords, credit card numbers, or account credentials.
Smishing
Smishing is a type of cyber attack that uses text messages or SMS to impersonate legitimate organizations or individuals, often using social engineering tactics, to trick the victims into revealing sensitive information, such as passwords, credit card numbers, or account credentials.
VLAN
A VLAN (Virtual Local Area Network) is a logical grouping of devices on a network, independent of their physical location or connection, used for segmenting traffic, improving security, and enhancing performance and management.
Password
A password is a sequence of characters that is used for authenticating a user, accessing a system or device, or protecting sensitive information, often used for preventing unauthorized access, data loss, or identity theft.
Passphrase
A passphrase is a longer and more complex form of a password, often consisting of multiple words or phrases, used for increasing security and reducing the risk of brute-force attacks, dictionary attacks, or password guessing.
GDPR
GDPR (General Data Protection Regulation) is a regulation that is designed to protect the privacy and personal data of EU citizens, by setting rules and guidelines for how organizations should collect, process, store, and share personal data, and by imposing fines and penalties for non-compliance.
Data Protection
Data protection is the process of safeguarding data from unauthorized access, disclosure, modification, or destruction, by using technical, organizational, and legal measures, such as encryption, access controls, backups, and policies.
Data Protection Impact Assessment (DPIA)
A Data Protection Impact Assessment (DPIA) is a process that helps organizations identify and mitigate the risks that may arise from the processing of personal data. It involves assessing the nature, scope, context, and purposes of the processing, as well as the risks to the rights and freedoms of individuals, and implementing appropriate measures to address those risks.
Pass-the-Cookie
Pass-the-Cookie is a cyber attack where an attacker intercepts and steals a user's authentication cookie in order to gain access to their online accounts.
Threat Actor
A threat actor is an individual or group who seeks to carry out malicious activities against an organization or individual. Threat actors can be hackers, cybercriminals, hacktivists, nation-states, or insiders with access to sensitive information. Understanding the motivation, tactics, and techniques of threat actors is an important part of cybersecurity risk management.
Adversary-in-the-Middle (AitM)
An adversary-in-the-middle (AitM) attack, also known as a man-in-the-middle (MitM) attack, is a type of cyberattack where a perpetrator positions themself in a conversation between two parties — two users, two devices, or a user and an application or server — so that all communications are going to or through the attacker
Cyber Bullying
Cyber bullying is the use of technology to harass, humiliate, or intimidate someone. This can take many forms, such as sending threatening or hurtful messages, spreading rumors or lies, posting embarrassing photos or videos, or impersonating someone online. Cyber bullying can be especially damaging because it can happen anytime and anywhere, and the anonymity of the internet can make it harder to identify the perpetrator or seek help.
eSafety
eSafety, or online safety, refers to the practices and measures taken to protect people from online harm, such as cyberbullying, identity theft, or exposure to inappropriate content. It includes education, awareness, and technical solutions, such as parental controls, firewalls, and antivirus software.
Cookie
A small piece of data sent from a website and stored on the user's computer by the user's web browser while the user is browsing.
Cloud Computing
The delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.
File Sharing
The practice of distributing or providing access to digital media, such as computer programs, multimedia, documents, or electronic books.
Filtering
The process of controlling the content that can be accessed on the Internet.
Proxy Server
A server that acts as an intermediary for requests from clients seeking resources from other servers.
Instant Messaging
A type of online chat that offers real-time text transmission over the Internet.
Patching
The process of updating or fixing software vulnerabilities to improve security and prevent attacks.
Cyberstalking
The use of the Internet or other electronic means to stalk or harass an individual, a group, or an organization.
Flaming
The act of posting or sending offensive messages over the Internet with the intent to hurt, insult, or provoke.
Identity Theft
The illegal use of someone else's personal information to steal money or gain other benefits.
Troll
A person who intentionally provokes or harasses others online, typically in discussion forums or comment sections.