Innovative Digital Solutions for SMBs

Glossary / Dictionary

Glossary of terms and definitions for IT (Information Technology), the Internet and cyber security.

This glossary provides more than 480 clear and concise definitions of commonly used terms in the fields of information technology, the internet, and cyber security. It is designed to support users of all levels in understanding key concepts, technical jargon, and acronyms frequently encountered across digital platforms and security-related discussions. Whether you are a business owner, student, professional, or simply interested in the digital landscape, this resource aims to enhance your knowledge and confidence in navigating the ever-evolving world of technology.



Download

The process of receiving digital data from the internet or a remote system onto a local device, typically for storage or offline use.

Example: She downloaded a report from the government website.

See also: Upload



Drive-by Download

The unintentional download of malware when visiting a compromised website, often without the user's knowledge.

Example: Visiting an infected website causes a malicious file to be downloaded onto your computer automatically.



ADSL (Asymmetric Digital Subscriber Line)

A type of broadband internet connection that uses existing telephone lines with higher download than upload speeds.

Example: A household in regional NSW uses ADSL for internet access where fibre is not yet available.

See also: Broadband, SDSL, NBN



Cache

A temporary storage area in computers or browsers used to store frequently accessed data or files to speed up future access. Caching improves performance by reducing the need to re-download or reprocess information each time it is requested.

Example: Clearing the browser cache resolved the website loading issue.



Clickjacking

A technique that tricks users into clicking something different from what they think, often to steal information or install malware.

Example: A deceptive webpage has a "Play" button that actually triggers a hidden download of malicious software.



Hash Function

An algorithm that converts data into a fixed-length string (hash) for verification purposes. Hashes are used to ensure data integrity.

Example: When you download a file, its hash value can be compared with the original to ensure it hasn't been altered.



ISP (Internet Service Provider)

A company or organisation that provides internet access along with additional services such as email, web hosting, and domain registration, often offering broader packages than an Internet Access Provider (IAP)

Example: They switched ISPs to get faster download speeds.



POP3 (Post Office Protocol version 3)

A standard email protocol used to retrieve emails from a mail server to a local device. POP3 downloads the messages and usually deletes them from the server after download.

Example: She configured her email client to use POP3 so that her messages would be stored on her laptop and not kept on the server.

See also: IMAP, Mail Server



SDSL (Symmetric Digital Subscriber Line)

A broadband internet connection that provides equal upload and download speeds.

Example: A business uses SDSL to support video conferencing and file uploads with consistent performance.

See also: Broadband, ADSL, NBN



Spear Phishing

A highly targeted phishing attack aimed at a specific individual or organisation, often using personalised details to appear more convincing.

Example: You receive an email that appears to be from your manager, asking you to download an urgent file, which actually contains malware.

See also: Phishing