Innovative Digital Solutions for SMBs

Glossary / Dictionary

Glossary of terms and definitions for IT (Information Technology), the Internet and cyber security.

This glossary provides more than 480 clear and concise definitions of commonly used terms in the fields of information technology, the internet, and cyber security. It is designed to support users of all levels in understanding key concepts, technical jargon, and acronyms frequently encountered across digital platforms and security-related discussions. Whether you are a business owner, student, professional, or simply interested in the digital landscape, this resource aims to enhance your knowledge and confidence in navigating the ever-evolving world of technology.



Encryption

A method of securing digital information by converting it into a coded format that can only be read by someone with the correct decryption key.

Example: Encryption protected the files during cloud transfer.

See also: Decryption



Encryption Algorithm

A mathematical process used to encrypt and decrypt data, ensuring secure communication and data protection.

Example: AES (Advanced Encryption Standard) is an encryption algorithm widely used to encrypt sensitive data like financial transactions.



Encryption Key

A string of characters used in encryption algorithms to encode or decode data, ensuring secure communication.

Example: Your messaging app encrypts messages using an encryption key so only the recipient can read them.



Data Encryption

The process of converting data into a coded format to prevent unauthorised access. Only those with the decryption key can read it.

Example: Your online banking app encrypts your data, so even if it's intercepted, it can't be read without the correct key.

See also: Encryption, Decryption



Escrowed Encryption

A system where encryption keys are held by a trusted third party, allowing access in emergencies or by authorised request.

Example: A company stores encryption keys with a third party to ensure they can access data if their systems fail.



BitLocker

BitLocker is a full disk encryption feature included with Microsoft Windows (Enterprise and Pro editions) that protects data by encrypting entire volumes.

Example: An organisation uses BitLocker to encrypt the hard drives of employee laptops to prevent data theft if devices are lost or stolen.

See also: Data Encryption



LUKS

Linux Unified Key Setup (LUKS) is a standard for hard disk encryption in Linux, allowing secure management of multiple user passwords and encryption configurations.

Example: A systems administrator uses LUKS to encrypt a Linux server's storage to ensure sensitive data is protected from unauthorised access.

See also: Data Encryption



Cryptography

The practice of securing information by converting it into an unreadable format (encryption) so only authorised users can decode it.

Example: Sending an encrypted email so only the intended recipient, who has the decryption key, can read it.



Cyber Security

The practice of protecting systems, networks, and digital data from unauthorised access, attacks, or damage. Cyber security includes measures such as firewalls, encryption, authentication, and user education to defend against threats like malware and hacking.

Example: The company implemented new cyber security protocols after a phishing incident.



Endpoint Security

Protective measures and tools designed to secure endpoint devices such as desktops, laptops, tablets, and smartphones from cyber threats. It typically includes antivirus software, firewalls, encryption, and advanced threat detection to prevent unauthorised access and data breaches.

Example: Installing antivirus software and encrypting data on company laptops.

See also: Endpoint



Hardware Security Module (HSM)

A physical device that securely manages and protects cryptographic keys, performing encryption and decryption operations.

Example: Banks use HSMs to secure customer transaction data and protect encryption keys from theft.



Mobile Security

Measures taken to protect mobile devices from threats like malware, data theft, and unauthorised access.

Example: Using device encryption, biometric authentication, and remote wipe features to secure smartphones.



Public Key

A cryptographic key shared openly to encrypt data or verify digital signatures, paired with a private key in asymmetric encryption.

Example: The sender used the public key to encrypt the file.

See also: Private Key, Encryption



Quantum Cryptography

A method of encrypting data using principles of quantum mechanics to ensure secure communication that is resistant to hacking.

Example: Quantum key distribution is used to exchange encryption keys securely between two parties.



Side-Channel Attack

An attack that exploits indirect information, such as power consumption or timing data, to extract sensitive information.

Example: Analysing the power usage of a device to determine encryption keys.



SSL (Secure Sockets Layer)

SSL (Secure Sockets Layer) = A cryptographic protocol designed to establish a secure and encrypted connection between two systems over a network. SSL ensures that data transmitted between these systems remains confidential, authenticated, and protected from interception or tampering. While commonly associated with securing communication between web browsers and web servers (HTTPS), SSL can also secure email communications, file transfers, instant messaging, and other network services. Although SSL has been largely replaced by its successor, TLS (Transport Layer Security), the term "SSL" is still widely used to refer to secure communication protocols.

Example: When you see a padlock icon in your browser's address bar, it indicates the website is using SSL/TLS encryption.

See also: TLS, SSL Certificate



TLS (Transport Layer Security)

TLS (Transport Layer Security) = A cryptographic protocol designed to provide secure and encrypted communication between two systems over a network. TLS ensures data confidentiality, integrity, and authentication during transmission, protecting it from interception, tampering, or forgery. TLS is the successor to SSL (Secure Sockets Layer) and offers improved security, stronger encryption algorithms, and better performance. It is widely used to secure web traffic (HTTPS), email communications, file transfers, instant messaging, and other network-based services.

Example: Websites with HTTPS use TLS to protect data during transactions, such as online banking or shopping.

See also: SSL



Wireless Security

Protective measures to secure wireless networks, such as encryption, passwords, and authentication protocols.

Example: Enabling WPA3 encryption on your home Wi-Fi network to prevent unauthorised access.



WPA (Wi-Fi Protected Access)

A security protocol designed to protect wireless networks by encrypting data and ensuring secure communication.

Example: WPA3 encryption is used on home Wi-Fi routers to prevent unauthorised access.