top of page
Untitled design_edited.jpg

Learn the lingo of digital tech gurus, one term at a time

- ONLINE SECURITY GLOSSARY -

Authentication

The process of verifying the identity of a user or device when they attempt to gain access to something online.

Cyberattack

An attempt by hackers to damage or destroy a computer network or system.

Cyber Threat

Any malicious act that seeks to damage, steal or interefere with data, or disrupts a person or organisation's digital life in general.

Data Breach

The release of secure or private information without the authorisation of the information's owner.

Data In Transit

Data that is actively moving from one location to onther, such as across public networks like the internet or within private networks like Local Area Networks (LANs).

Data Spill

The intentional or unintentional exposure of information into an uncontrolled or unauthorised digital environment.

Encoding

The process of converting data from one form to another, typically requiring the application of a specific code to the data for conversion.

Encryption

The process of converting information or data into a code, typically to prevent unauthorised access to the information or data.

Firewall

A network security system that monitors and controls traffic to or from your network. A firewall can allow or block traffic based on predetermined security rules to better regulate who or what can pass through your network.

Fuzzing

An automated software testing technique that is used to discover coding errors and security loopholes in networks, software and operating systems.

Hacker

A programming expert who uses computers and their technical knowledge to gain access to data by non-standard means.

Hacktivism

A social or political activist act that is carried out through hacking or another computer-based technique, intending to cause havoc on a secure network system. 

Hardware

The physical components of a computer that are required for the device to function.

Honeypot

A security mechanism that is set up to detect, deflect or in some way counteract the attempts of cyber attackers.

Identity Fraud

When someone uses another person's personal information to obtain a benefit, such as opening a bank account, accessing a credit card, applying for a passport or conducting illegal behaviour under someone else's identity.

Insider Threat

A security risk that comes from within one's own organisation, such as an employee, former employees, contractors or business associates who have inside information on the organisation's security practices.

Internet Protocol (IP)

The set of rules governing the format of data sent over the internet or another network.

Internet Service Provider (ISP)

A company that gives consumers and businesses access to the internet.

Local Area Network (LAN)

A type of computer network that interconnects devices within a limited area such as a residence, school, laboratory or office building. 

Malware (Malicious Software)

Software that is deliberately designed to cause damage to a computer, server, user or network.

Metadata

A set of data that describes and gives information about other data. In other words, metadata is "data about other data". Types of metadata include descriptive, structural, administrative, reference, statistical and legal metadata.

Multi-Factor Authentication (MFA)

A security method that requires multiple forms of authentication before allowing a user to access a website, application or other digital resource. MFA is used to prevent hackers from gaining access to other users' digital spaces, ensuring that people are who they say they are when logging in.

Network

A group of computer systems that are linked together. Types of networks include Local Area Network (LAN), Wide Area Network (WAN), Wireless Local Area Network (WLAN), Storage Area Network (SAN) and Metro Area Network (MAN). Networks may be further categorised based on topology, protocol and architecture.

Outsider Threat

A security risk that comes from outside one's own organisation, incited by an external person or people who are not authorised to access the organisation's assets, and pose a potential risk to them or the organisation as a whole.

Password

A sequence of letters, numbers and/or special characters that allow access to a computer, system, account or other digital service.

Ransomware

A type of malware (malicious software) that makes your device's files inaccessible or unusable.

Security Risk

Any person or situation that poses a threat to the safety or security of a person online.

Online Security Glossary

©2021 by Security&Me. Proudly created with Wix.com

bottom of page