Glossary of terms and definitions for IT (Information Technology), the Internet and cyber security.
This glossary provides more than 480 clear and concise definitions of commonly used terms in the fields of information technology, the internet, and cyber security. It is designed to support users of all levels in understanding key concepts, technical jargon, and acronyms frequently encountered across digital platforms and security-related discussions. Whether you are a business owner, student, professional, or simply interested in the digital landscape, this resource aims to enhance your knowledge and confidence in navigating the ever-evolving world of technology.
A software application used to access, retrieve, and view content on the World Wide Web, including websites, images, and multimedia, with popular examples being Brave, Chrome, Firefox, and Safari.
Example: He updated his browser to improve compatibility with new web applications.
See also: Software
Malware that infects a web browser to intercept and manipulate online transactions.
Example: MitB malware captures your online banking login details while you're making a payment.
Software or browser extension that removes or hides online advertisements.
Example: She installed an ad blocker to prevent pop-ups while browsing news sites.
The Address Bar is the text field in a web browser, usually near the top, where users enter a website's URL to navigate to a specific web page.
Example: The user typed www.digitaldreams.com.au into the address bar to access the Digital Dreams website.
See also: Browser
An Application, or App, is a software program designed to help users perform specific tasks, such as word processing, web browsing, or messaging, and can run on computers, mobile devices, or even in a web browser.
Example: He downloaded a budgeting app to manage his monthly expenses.
See also: Software
An organisation that issues digital certificates to verify identities and secure online communications.
Example: Your web browser shows a padlock icon when visiting a secure website, indicating a valid certificate from a trusted CA.
A temporary storage area in computers or browsers used to store frequently accessed data or files to speed up future access. Caching improves performance by reducing the need to re-download or reprocess information each time it is requested.
Example: Clearing the browser cache resolved the website loading issue.
An attack where a malicious website tricks a user's browser into performing actions on another website where the user is authenticated.
Example: A user clicks a malicious link that causes their bank account to transfer funds without their knowledge.
A preset value or setting automatically applied by a computer system, application, or device when the user does not specify an alternative. Defaults help standardise operations and ensure functionality out of the box.
Example: The browser opened to its default homepage until he changed the settings.
A collection of tools used by cyber criminals to exploit known vulnerabilities in systems or software.
Example: An exploit kit targets unpatched versions of a web browser to install ransomware on users' devices.
Malware that resides in a computer's memory rather than the hard drive, making it difficult to detect and remove.
Example: An attacker exploits a vulnerability in a web browser to run fileless malware that steals data during a session.
The main entry page of a website or the default page shown when a web browser starts.
Example: The homepage featured the latest news updates.
A Page View is a metric that counts each time a web page is loaded or reloaded in a browser, used to measure website traffic and user engagement.
Example: The business website received over 5,000 page views during the first week of its new campaign.
A Process is an instance of a program that is executing on a computer, including its current activity and system resources being used.
Example: The task manager shows several running processes, including one for the web browser.
SSL (Secure Sockets Layer) = A cryptographic protocol designed to establish a secure and encrypted connection between two systems over a network. SSL ensures that data transmitted between these systems remains confidential, authenticated, and protected from interception or tampering. While commonly associated with securing communication between web browsers and web servers (HTTPS), SSL can also secure email communications, file transfers, instant messaging, and other network services. Although SSL has been largely replaced by its successor, TLS (Transport Layer Security), the term "SSL" is still widely used to refer to secure communication protocols.
Example: When you see a padlock icon in your browser's address bar, it indicates the website is using SSL/TLS encryption.
See also: TLS, SSL Certificate
A weakness or flaw in a system, network, or software that can be exploited by attackers to gain unauthorised access or cause damage.
Example: An outdated version of a web browser with unpatched vulnerabilities allows an attacker to install malware on your device.
A web application is a software program that runs on a web server and is accessed through a browser over the internet.
Example: The Australian Taxation Office provides a web application for users to lodge their tax returns online.
A web page is a single document on the internet written in HTML and viewed in a browser, forming part of a website.
Example: The web page displayed details about upcoming community events in Brisbane.
See also: Website
An attack that targets a vulnerability unknown to the software vendor, giving them "zero days" to provide a fix.
Example: An attacker discovers a flaw in a web browser and uses it to steal data before a patch is released.