Innovative Digital Solutions for SMBs

Glossary / Dictionary

Glossary of terms and definitions for IT (Information Technology), the Internet and cyber security.

This glossary provides more than 480 clear and concise definitions of commonly used terms in the fields of information technology, the internet, and cyber security. It is designed to support users of all levels in understanding key concepts, technical jargon, and acronyms frequently encountered across digital platforms and security-related discussions. Whether you are a business owner, student, professional, or simply interested in the digital landscape, this resource aims to enhance your knowledge and confidence in navigating the ever-evolving world of technology.



Hacker

A person who uses technical skills to access systems or data. Hackers can be ethical (white hat) or malicious (black hat).

Example: A white hat hacker finds vulnerabilities in a company's system and helps them fix it.

See also: White Hat Hacker, Black Hat Hacker



Black Hat Hacker

A hacker who violates security for personal gain, malicious intent, or to cause damage to systems or data.

Example: A black hat hacker breaches a company's database and sells the stolen customer data on the dark web.

See also: White Hat Hacker, Hacker



White Hat Hacker

An ethical hacker who uses their skills to identify and fix security vulnerabilities in systems, helping organisations improve security.

Example: A company hires a white hat hacker to conduct a security audit and discover weaknesses before malicious hackers do.

See also: Black Hat Hacker, Hacker



Advanced Persistent Threat (APT)

A prolonged, targeted cyberattack where an intruder gains unauthorised access to a network and remains undetected for an extended period, often to steal sensitive data.

Example: A hacker group infiltrates a government agency's network and remains hidden for months, slowly exfiltrating classified documents.



Anti-Forensics

Techniques used to prevent or hinder digital forensic investigations by erasing or obscuring evidence.

Example: A hacker uses anti-forensics tools to delete logs and hide their tracks after a data breach.



Backdoor / Back Door

A hidden method within software, hardware, or a system that allows someone to bypass normal authentication or security controls. Backdoors can be intentionally coded by developers for maintenance purposes or maliciously created by attackers to gain unauthorised access.

Example: A software developer includes a backdoor for troubleshooting, while a hacker might install a backdoor in a compromised server to maintain covert access.



Brute Force Attack

A trial-and-error method where an attacker tries every possible password combination to gain access to an account.

Example: A hacker uses automated software to guess the password to your email by systematically trying every combination of letters and numbers.



Cyber Attack / Cyberattack

Any deliberate attempt to damage, disrupt, or gain unauthorised access to computer systems, networks, or data.

Example: A hacker launches a ransomware attack on a hospital, encrypting patient records until a ransom is paid.



DoS (Denial-of-Service)

An attack where a system is overwhelmed with traffic or requests, making it unavailable to legitimate users.

Example: A hacker floods a website with so many requests that it crashes and can't be accessed.

See also: DDoS



Eavesdropping Attack

An attack where a hacker intercepts private communications, such as emails or phone calls, to steal sensitive information.

Example: An attacker uses a packet sniffer to capture login credentials sent over an unencrypted Wi-Fi network.



Rogue Access Point

An unauthorised Wi-Fi access point installed on a network, often used by attackers to intercept traffic.

Example: A hacker sets up a rogue access point in a coffee shop to steal data from users who connect.



Watering Hole Attack

An attack where hackers compromise websites frequently visited by their target audience to infect visitors with malware.

Example: A hacker infects a popular industry forum with malware, knowing employees from specific companies frequently visit the site.



Zombie Computer

A device that has been compromised by malware and is controlled remotely by an attacker, often used in botnets for cyber attacks.

Example: A hacker uses thousands of zombie computers to launch a Distributed Denial-of-Service (DDoS) attack on a website.

See also: Botnet