Glossary of terms and definitions for IT (Information Technology), the Internet and cyber security.
This glossary provides more than 480 clear and concise definitions of commonly used terms in the fields of information technology, the internet, and cyber security. It is designed to support users of all levels in understanding key concepts, technical jargon, and acronyms frequently encountered across digital platforms and security-related discussions. Whether you are a business owner, student, professional, or simply interested in the digital landscape, this resource aims to enhance your knowledge and confidence in navigating the ever-evolving world of technology.
The process of receiving digital data from the internet or a remote system onto a local device, typically for storage or offline use.
Example: She downloaded a report from the government website.
See also: Upload
The unintentional download of malware when visiting a compromised website, often without the user's knowledge.
Example: Visiting an infected website causes a malicious file to be downloaded onto your computer automatically.
A type of broadband internet connection that uses existing telephone lines with higher download than upload speeds.
Example: A household in regional NSW uses ADSL for internet access where fibre is not yet available.
See also: Broadband, SDSL, NBN
A temporary storage area in computers or browsers used to store frequently accessed data or files to speed up future access. Caching improves performance by reducing the need to re-download or reprocess information each time it is requested.
Example: Clearing the browser cache resolved the website loading issue.
A technique that tricks users into clicking something different from what they think, often to steal information or install malware.
Example: A deceptive webpage has a "Play" button that actually triggers a hidden download of malicious software.
An algorithm that converts data into a fixed-length string (hash) for verification purposes. Hashes are used to ensure data integrity.
Example: When you download a file, its hash value can be compared with the original to ensure it hasn't been altered.
A company or organisation that provides internet access along with additional services such as email, web hosting, and domain registration, often offering broader packages than an Internet Access Provider (IAP)
Example: They switched ISPs to get faster download speeds.
A standard email protocol used to retrieve emails from a mail server to a local device. POP3 downloads the messages and usually deletes them from the server after download.
Example: She configured her email client to use POP3 so that her messages would be stored on her laptop and not kept on the server.
See also: IMAP, Mail Server
A broadband internet connection that provides equal upload and download speeds.
Example: A business uses SDSL to support video conferencing and file uploads with consistent performance.
See also: Broadband, ADSL, NBN
A highly targeted phishing attack aimed at a specific individual or organisation, often using personalised details to appear more convincing.
Example: You receive an email that appears to be from your manager, asking you to download an urgent file, which actually contains malware.
See also: Phishing