Glossary of terms and definitions for IT (Information Technology), the Internet and cyber security.
This glossary provides more than 480 clear and concise definitions of commonly used terms in the fields of information technology, the internet, and cyber security. It is designed to support users of all levels in understanding key concepts, technical jargon, and acronyms frequently encountered across digital platforms and security-related discussions. Whether you are a business owner, student, professional, or simply interested in the digital landscape, this resource aims to enhance your knowledge and confidence in navigating the ever-evolving world of technology.
A person who uses technical skills to access systems or data. Hackers can be ethical (white hat) or malicious (black hat).
Example: A white hat hacker finds vulnerabilities in a company's system and helps them fix it.
See also: White Hat Hacker, Black Hat Hacker
A hacker who violates security for personal gain, malicious intent, or to cause damage to systems or data.
Example: A black hat hacker breaches a company's database and sells the stolen customer data on the dark web.
See also: White Hat Hacker, Hacker
An ethical hacker who uses their skills to identify and fix security vulnerabilities in systems, helping organisations improve security.
Example: A company hires a white hat hacker to conduct a security audit and discover weaknesses before malicious hackers do.
See also: Black Hat Hacker, Hacker
A prolonged, targeted cyberattack where an intruder gains unauthorised access to a network and remains undetected for an extended period, often to steal sensitive data.
Example: A hacker group infiltrates a government agency's network and remains hidden for months, slowly exfiltrating classified documents.
Techniques used to prevent or hinder digital forensic investigations by erasing or obscuring evidence.
Example: A hacker uses anti-forensics tools to delete logs and hide their tracks after a data breach.
A hidden method within software, hardware, or a system that allows someone to bypass normal authentication or security controls. Backdoors can be intentionally coded by developers for maintenance purposes or maliciously created by attackers to gain unauthorised access.
Example: A software developer includes a backdoor for troubleshooting, while a hacker might install a backdoor in a compromised server to maintain covert access.
A trial-and-error method where an attacker tries every possible password combination to gain access to an account.
Example: A hacker uses automated software to guess the password to your email by systematically trying every combination of letters and numbers.
Any deliberate attempt to damage, disrupt, or gain unauthorised access to computer systems, networks, or data.
Example: A hacker launches a ransomware attack on a hospital, encrypting patient records until a ransom is paid.
An attack where a system is overwhelmed with traffic or requests, making it unavailable to legitimate users.
Example: A hacker floods a website with so many requests that it crashes and can't be accessed.
See also: DDoS
An attack where a hacker intercepts private communications, such as emails or phone calls, to steal sensitive information.
Example: An attacker uses a packet sniffer to capture login credentials sent over an unencrypted Wi-Fi network.
An unauthorised Wi-Fi access point installed on a network, often used by attackers to intercept traffic.
Example: A hacker sets up a rogue access point in a coffee shop to steal data from users who connect.
An attack where hackers compromise websites frequently visited by their target audience to infect visitors with malware.
Example: A hacker infects a popular industry forum with malware, knowing employees from specific companies frequently visit the site.
A device that has been compromised by malware and is controlled remotely by an attacker, often used in botnets for cyber attacks.
Example: A hacker uses thousands of zombie computers to launch a Distributed Denial-of-Service (DDoS) attack on a website.
See also: Botnet