There are many complicated ideas and subjects related to Internet security, and it can be difficult to understand them all. Given this difficulty, we have made the decision to assist you by providing a glossary of pertinent terms, acronyms, and abbreviations along with definitions.
Ad blocker
A tool called an adblocker is made to stop any intrusive ads, most commonly pop-ups. In addition to being browser extensions, ad blockers can also be used in conjunction with content blockers. The content blocker has the ability to block both ads and cookies, while the ad blocker manages the ads.
AES
The abbreviation AES stands for Advanced Encryption Standard. It describes a method for encrypting data transmission between any two devices. Thus, it is a means of achieving a digital communication method that is far safer. AES is frequently used to encrypt VPN connections and is available in “key sizes” of 128, 156, and 192 bits.
Anonymity
Having your name removed from public domains is what it means to be considered anonymous or to be anonymous. If it is hard or impossible to identify you among a group of users, you are also anonymous.
Anonymous email
An email address that has an untraceable owner is known as an anonymous email. This type of email address has the ability to automatically forward messages to the real email address. One can create an email similar to this in a number of places.
Anti-spam
The term “anti-spam” describes a method, piece of hardware, or piece of software that blocks spam. Spam is the practice of sending unsolicited bulk messages. Anti-spam tools therefore prevent spam and junk mail from entering your email account. It accomplishes this by identifying and eliminating emails that it deems undesirable or dangerous, including phishing emails.
Asymmetric encryption
Asymmetric encryption uses two keys: public and private. While the private key can only be decrypted by the owner, the public key is available to everyone.
Backdoor
Backdoors are a type of concealed opening in software that allows one to get around security and encryption measures. These backdoors were purposefully included in the design process. Unfortunately, these backdoors can also be used by hackers to access your devices.
Bandwidth
The bandwidth of your network is the maximum amount of data it can send over a communication channel. Broadband rates are commonly measured by ISPs in:
- Bps (bits per second)
- Kbps (kilobits per second)
- Mbps (megabits per second)
- Gbps (gigabits per second)
Every one of these speeds is greater than the one before it, so you can download data more quickly if the speed rises.
Bitcoin
One of the most well-known cryptocurrencies is Bitcoin, which is distinguished by its decentralized system of exchange. Bitcoin is an anonymous payment method since all transactions are encrypted and run through the blockchain.
BitTorrent
BitTorrent is a peer-to-peer file sharing communication protocol. Movies, music, and software are frequently shared using it.
Browser extension
Browser extensions are a type of software that gives your devices and browsers a number of additional features. The features of browser extensions include ad blocking, password saving, and privacy protection.
Browser fingerprinting
A method for identifying a computer’s user is called “browser fingerprinting.” A third party can monitor your online activities by using browser fingerprinting. Getting complete protection against browser fingerprinting is very challenging.
Bug bounty program
A bug bounty program is a project designed by an organization to reward third-party individuals for finding security bugs in their software. These kinds of individuals are often known as “white hat hackers” and will document any bugs or threats they encounter to help with assessment and assigning a threat level — which all influence the payment amount.
Catfishing
A social engineering scam known as “catfishing” occurs when a scammer fabricates an online persona in order to target victims on social media sites. The catfish may do this for a number of reasons, such as initiating targeted harassment, manipulating the victims, or surreptitiously spying on others.
Certificate authority
Digital certificates can be issued by an organization known as a certificate authority. The digital certificates serve as proof that the holder has a public cryptographic key.
Cipher
One tool for decrypting encrypted data is a cipher. A mathematical algorithm makes up a cipher, also referred to as an encryption algorithm. While security experts work to improve ciphers, hackers treat them like locks that must be broken.
Connection methods
When two or more devices communicate with each other, a “connection” is formed. The connection method is the way a device uses a VPN to connect to a server. There are many different kinds of VPN connection methods, such as L2TP, PPTP, and OpenVPN, and each has unique characteristics.
Cookies
A cookie is a small text file created by any website you visit. Your browser then receives these “cookies.” Cookies hold extremely private information about you, such as your username on certain websites, the items you purchase, and your preferences on websites, all of which can be used to easily identify you.
Cyberbullying
Cyberbullying, which includes harmful actions, is a type of cyberstalking. Sharing damaging information about someone exposes them to public humiliation, among other forms of it.
Cyberstalking
Cyberstalking is a form of harassment in which the perpetrator follows their victims using digital tools. Among these tools are email and location trackers. Crimes like doxxing, physical threats, identity theft, and blackmail are frequently the result of cyberstalking.
Dark web
The deep web, which is much larger, is symbolized by the dark web. Many websites that are not included in search engine indexes can be found on the deep web. These websites require a secret password to access them.
Many illegal and fraudulent websites that frequently deal in taboo content are what define the dark web.
DD-WRT
An open-source substitute firmware for routers is called DD-WRT. It runs on Linux and works with a wide variety of routers. DD-WRT has gained enormous popularity because of its many useful features, such as making routers that wouldn’t normally support a VPN compatible.
Decryption
Decryption is the process of converting encrypted data into information that computers or people can read. It is encryption in reverse. Data becomes ciphertext when encrypted and plaintext when decrypted.
Dedicated IP
This is a special IP address that has been allocated to your hosting account and websites. It is typically provided by a network administrator or ISP. The primary users of dedicated IP addresses are websites that employ SSL (Secure Sockets Layer) verification.
Deepfake
Artificial intelligence (AI) and machine learning are used in Deepface, a type of synthetic media, to produce incredibly realistic and frequently modified visual and aural content. To fool users into thinking that the final image is real, Deepfake combines manipulated images and audio files.
Digital footprint
A user’s digital footprint is made up of all of their online actions that are visible to others. Digital traces can be active or passive. While social media posts, accounts, and other deliberate actions are examples of active digital footprints, browsing activity and data files like cookies are examples of passive digital footprints.
A digital footprint raises serious privacy concerns even though it’s a fantastic way to establish an online reputation. It exposes you to customized advertisements and even puts you at risk of cyberstalking.
DMCA
A piece of American law known as the Digital Millennium Copyright Act, or DMCA, was established to safeguard intellectual property. The development and dissemination of any software intended to circumvent digital security measures is forbidden by the DMCA.
The DMCA gives creators the right to demand that their content be removed from websites and their servers, or face legal action because it also protects copyright. A subpoena called a DMCA takedown notice is frequently used to achieve this.
DNS
The Domain Name System, which is a group of servers, is referred to as DNS. These servers act as a domain name directory. DNS makes it simple to convert domain names into usable, readable IP addresses so you can connect to the appropriate server.
DNS Leak
When a VPN user inadvertently accesses a website hosted by a DNS server that is not part of the VPN, this is known as a DNS leak.
Download fine
When someone downloads any copyrighted material from unofficial sources, they are punished with download fines. The fine is determined by the copyright regulations in the particular area.
Dynamic IP
One type of IP that changes frequently is called dynamic IP. It is the IP address given to a computing device or node when both are linked to a network.
Eavesdropping
The secret interception of unencrypted information moving between two locations is known as eavesdropping. Hackers are well known for using this method to obtain sensitive information, such as tokens.
Encryption
Information that has been encoded using a cipher so that only authorized users can access it is referred to as encryption. Unless someone has a key to decrypt it into useful information, encrypted data is frequently distorted to conceal its content.
End-to-end encryption
The term “end-to-end encryption” describes a kind of encryption that protects data from “beginning” to “end.” Data is decrypted before it is sent to the user in services that do not employ this kind of encryption. This flaw gives hackers the ability to steal data.
Ethernet
The most widely used “wired networking technology” that enables communication between several devices in a local area network is Ethernet. The connection for information transfer is made easier by fiber optic cables.
Ethical hacking
The sole goal of this kind of hacking is to find any software or network vulnerabilities. A cybersecurity specialist who is authorized to legally hack their client in order to find any vulnerabilities and is expected to offer fixes to stop those vulnerabilities from being exploited is known as an ethical hacker.
Evil twin
Setting up a phony Wi-Fi network that mimics an actual network to steal user data is known as an evil twin cyberattack.
Factory reset
One method of data cleaning that helps get rid of all the data on a device is a factory reset.
Apps and settings images are lost during a factory reset, which returns the device to its original state.
Firewall
One type of security measure used to regulate and/or keep an eye on network traffic is a firewall. They are employed to prevent any illegal access that might be regarded as dangerous or unreliable.
The Five Eyes
The Five Eyes are a group of five nations that have joined forces to help each other improve their individual and group espionage efforts. American, British, Canadian, Australian, and New Zealand are the five eyes.
GCHQ
The British equivalent of the National Security Agency (NSA) is called Government Communications Headquarters, or GCHQ. The Tempora program, which can track and store about 60% of all internet traffic worldwide, has recently brought them to the attention of everyone.
Geofencing
Geofencing is a technology that uses Wi-Fi, cellular data, RFID, or GPS to establish virtual boundaries in the real world. The software is notified when a device enters or exits this pre-established area, and a pre-programmed action is initiated.
Geographic Restrictions
The term “geographic restrictions” describes the steps done to guarantee that particular online content is only available in particular places. By using a VPN, one can circumvent these “geo-blocks.”
Handshake
In IT parlance, the process by which SSL/TLS exchanges and verifies certificates is called a handshake. When there is an encrypted connection between two or more devices, a handshake takes place.
HTTPS
A HTTPS connection uses a different protocol than an HTTP connection, so they should not be confused. For extra security, HTTPS connections mostly use an encrypted SSL protocol. Sensitive information is kept private by using HTTPS to exchange data securely.
IKEv2
An IPsec protocol technique for exchanging encryption keys is called Internet Key Exchange version 2, or IKEv2.
IP Address
An identification code used to establish internet connections is your IP address or Internet Protocol address. Furthermore, your real identification, IP address, and location. Your IP can be concealed from hackers and snoopers with a VPN.
IP binding
IP binding is a technique that only allows programs to be activated when a specific IP address is used. The IP is frequently linked to a virtual private network. IP binding prevents your computer’s programs from inadvertently connecting to the internet unless they do so using a secure IP address, which is frequently supplied by the VPN.
IPsec
Internet Protocol Security, or IPsec for short, is a type of security protocol that aids in data encryption and authentication just prior to transmission over the Internet. End-to-end encryption is another feature.
IP surveillance
The way IP surveillance operates is that an IP camera records a video, which is then sent over a LAN to an IP network.
IPv4
The standard technique for creating IP addresses is known as Internet Protocol version 4, or IPv4. Unfortunately, because the internet is growing so quickly, there are only a certain number of IPv4 addresses left.
IPv6
A follow-up to the IPv4 protocol, IPv6 stands for Internet Protocol version 6. Since IPv6 creates 128-bit IP addresses, the total number of addresses that can be created is 2^128. This is sufficient to cover the situation where IPv4 addresses become scarce.
ISP
The company in charge of providing clients with Internet access is known as an Internet service provider, or ISP for short. The ISP supports every kind of internet connection.
Jailbreaking
Removing restrictions from the iPhone and other restricted devices is known as jailbreaking. Jailbreaking enables users to use third-party apps and make much-needed changes to their devices. Although it is lawful, Apple disapproves of it because it breaches the warranty on the device.
Keylogger
A keylogger is a piece of hardware that allows a hacker to secretly record every keystroke a user makes. Although a keylogger is completely legal, it is not recommended because it is typically used for malicious purposes.
Kill switch
Most VPNs have a handy feature called a kill switch. If it detects that the VPN connection has failed, it must terminate internet connections. Because VPN connections are not always reliable and can malfunction at any time, a kill switch is essential. The switch helps prevent IP/DNS leaks.
Killware
A killware is a type of cyberattack that is intended to cause the target actual, severe physical harm, possibly even death. Attacks on banks, hospitals, and other organizations that have an impact on people’s lives and means of subsistence are examples of killware.
L2TP
VPNs encrypt and authenticate data using a technique called Layer 2 Tunneling Protocol, or L2TP. This protocol works in tandem with IPsec because it is unable to establish VPN connections on its own.
L2TP/IPsec
L2TP/IPsec creates a more secure VPN connection protocol by combining L2TP and IPsec.
Localhost
The term “local host” refers to a computer that is hosting an application that functions as a virtual server. The computer’s IP address can still be used to identify or refer to it in this configuration.
Logs
The files that your device, ISP, websites, and VPN providers store are called logs. Logs can be stored for a variety of purposes, such as identifying a specific person.
Mac address
An alphanumeric code called a MAC address is used to identify devices. Twelve characters make up this code, which is divided into six groups of pairs, such as 0A:1B:2C:3A:44:5C. This code, which is included with the device’s interface card, facilitates a smooth internet connection for users.
Metadata
The characteristics of information, such as text documents, websites, and images, are referred to as metadata. Three essential elements are described by metadata: when a file was used, by whom, and how long it has been since that use. Metadata is not encouraging for privacy issues.
Network sniffing
Network sniffing is the process of recording, examining, and monitoring data packets as they pass through a network. Network administrators frequently use this technique to look for issues or simply keep an eye on bandwidth usage. Hackers can also take advantage of this process for more sinister ends, such as stealing private information before it even reaches its destination.
NSA
The organization responsible for monitoring, collecting, and processing intelligence data is the National Security Agency or NSA.
Obfuscation
Obfuscation is the deliberate concealment or distortion of code to prevent any kind of tampering. Although completely functional, the programs created to accomplish obfuscation are extremely challenging to detect, stop, or even modify.
Onion domain
An onion domain is a website that can only be accessed using the Tor browser. The domain is too complex for standard browsers to use effectively due to its extensive network of proxy servers.
Open-source software
If the software is open-source, the public can access its source code without paying extra. Therefore, outside contributions and modifications are possible for open-source software. It also promotes speedier bug fixes.
OpenVPN
One of the safest VPN encryption protocols is OpenVPN, which is frequently used to create encrypted connections. Additionally, it is open-source.
P2P
P2P describes the type of connection that exists between two users. Peer-to-peer is what it stands for, particularly when discussing file exchanges, which are frequently torrents.
Since P2P connections don’t rely on servers, all data is transferred seamlessly between peers with no interference from servers. Although BitTorrent is a well-known P2P network, users should be aware that they are easily tracked if they do not have a VPN.
Packet sniffing
Packet sniffing is the process of analyzing how internet traffic flows across a network. Packet sniffers fall into two categories: hardware and software. It is completely legal to sniff packets in order to determine the health of a network. However, there are some evil uses for it.
Password manager
Programs called password managers are made to assist users in creating secure and one-of-a-kind passwords and in safely storing them.
Ping
An IP address’s reachability and existence can be checked using a tool called a Ping. In order to determine the device’s quality and responsiveness (its ping), a small data packet is first sent to the intended device and then returned.
PPTP
PPTP stands for Point-to-Point Tunneling Protocol. This VPN protocol is out of date and dangerous to use right now.
PGP
Email correspondence is protected by the encryption protocol known as Pretty Good Privacy (PGP). PGP can’t encrypt the email header, which contains metadata and raises privacy concerns, but it can encrypt the text and any attached files.
Proxy
Proxy servers are servers that bridge the gap between your device and the internet. Changing your virtual location is possible with proxy servers. Proxy servers, however, cannot be relied upon to safeguard your privacy because they do not encrypt any user data.
QR code phishing
A social engineering cyberattack known as a QR code phishing scam involves tricking unwary victims into scanning a QR code, which then steals their private data.
Router
It is the responsibility of routers to forward data between user devices and the internet. To “route” data packets to another network, routers first read the address of the network from which they are receiving them from a network of connected devices. Until the final destination is reached, the process keeps going.
SmartDNS
A VPN service called SmartDNS assists users in circumventing geo-blocking. To get around any geographical limitations, a SmartDNS uses a virtual location to partially replace the original location.
Spyware
Any malware that collects data from a single device and transfers it to a third party without the owner’s knowledge or consent is referred to as spyware. Law enforcement, hackers, and snoopers can all use spyware technology.
SSL
Secure Socket Layer, or SSL for short, is a cryptographic protocol used to encrypt data transmission between devices. Email, VoIP, messages, and websites can all be encrypted with SSL.
Static IP
This type of IP does not change over time; once it is issued by the ISP, it remains connected to the device indefinitely, regardless of changes.
Telemetry
The process of gathering data from a significant distance is known as telemetry. In the context of technology, this can refer to any form of data collection that takes place remotely, such as through operating systems and browsers.
TLS
One type of encryption used to protect digital communication is called Transport Layer Security, or TLS. It is SSL’s replacement.
Tor
The Onion Router, also known as Tor, is an internet network that enables anonymous web browsing. It functions similarly to the structure of an onion, with each connection representing a layer. Tiny bits of data are then transmitted through these layers, making it challenging to follow or intercept the data.
Although the Tor network has the potential to be used for illicit purposes, it can also be used to keep yourself safe when browsing the internet.
Two-factor authentication (2FA)
2FA is a method of user identity verification. Two levels of identification proof are frequently required for verification. It is difficult for someone else to access your accounts or data because of this two-stage verification.
URL
Any website can be accessed via a Uniform Resource Locator (URL), which is a usable address. The alphanumeric address can be used to obtain private information and also contains IP information.
VoIP
VoIP is a special kind of phone service that makes use of internet connections. VoIP calls can be placed on a desktop computer, IP phone, smartphone, or even a virtual phone simulator, but regular calls are typically made over traditional analog infrastructure.
VPN
Virtual private networks, or VPNs, are software programs that simulate a private network within a public network. VPNs can encrypt any type of internet traffic, making sure that nothing you do online can be read.
VPN connection
The link that has been established between the user and the VPN server of their choice is referred to as a VPN connection. It is protected by strong encryption.
VPN client
A VPN client is an individual’s connection to a software-provided VPN service. This client may be included in a paid service or be available for free. Choosing the appropriate VPN protocol and establishing a connection are two of its features.
VPN protocol
The encryption/authentication method used to establish a secure VPN connection is known as a VPN protocol. A wide range of VPN protocols are available for use. There are just three primary protocols. Of these, the most commonly applied ones are OpenVPN, PPTP, and L2TP.
VPN server
A VPN service owns and manages a VPN server to offer the utmost security and privacy. Data is encrypted before it is sent to the internet via a VPN server, which acts as an intermediary.
VPN tunnel
VPN tunnels are encrypted virtual links that typically connect a user’s device to a VPN server.
Whistleblower
Any person who reveals unethical or unlawful activity taking place within an organization is considered a whistleblower. The company may be government-owned, private, or public. Whistleblowing frequently uncovers useful information that was previously kept secret from the public to punish criminal activity.
Wi-Fi hotspot
Wi-Fi hotspots are open wireless networks that are reachable over the Internet. Every public location, including cafes, hotels, and even libraries, has Wi-Fi hotspots.
VPS
Virtual Private Server is what VPS stands for. Virtual private servers, or VPSs, are a type of larger server network that can be purchased for individual use.
Yellow hat hacker
One kind of hacker that focuses mostly on social media accounts is known as a “yellow hat” hacker. Naturally, they do this with malicious or illegal intent, such as distributing malicious software, stealing data, or distributing embarrassing files.
Zero client
One type of computing device that functions without a hard drive, software, processing power, or even memory is called a “zero client.” This simple device is safe for accessing sophisticated virtual desktop infrastructure, requires little upkeep, and depends on distant servers.
Narrowband
Narrowband is a communication method that transmits data using a limited range of frequencies. Due to its limited capacity and usage of bandwidth, this form of communication makes long-distance data transmission much simpler.