Innovative Digital Solutions for SMBs

Glossary / Dictionary

Glossary of terms and definitions for IT (Information Technology), the Internet and cyber security.

This glossary provides more than 480 clear and concise definitions of commonly used terms in the fields of information technology, the internet, and cyber security. It is designed to support users of all levels in understanding key concepts, technical jargon, and acronyms frequently encountered across digital platforms and security-related discussions. Whether you are a business owner, student, professional, or simply interested in the digital landscape, this resource aims to enhance your knowledge and confidence in navigating the ever-evolving world of technology.



Network

A collection of interconnected computers, devices, or systems that communicate and share resources such as data, files, and internet access. Networks can be connected using wired technologies like Ethernet cables or wireless technologies such as Wi-Fi.

Example: The office network included both wired desktop computers and Wi-Fi access for mobile devices.



Network Enumeration

The process of discovering devices, users, and services on a network, often as part of reconnaissance by attackers.

Example: An attacker scans a corporate network to find active devices and potential vulnerabilities.



Network Forensics

The capture, analysis, and investigation of network traffic to identify security incidents or breaches.

Example: After a data breach, analysts review network logs to trace the source of the attack.



Network Interface Card (NIC)

A hardware component that connects a computer or device to a network, enabling communication over wired or wireless connections.

Example: The technician installed a new NIC to upgrade the computer's network capabilities.

See also: Network, Hardware



Network Security

Measures taken to protect a computer network from unauthorised access or harm.

Example: The company invested in network security to prevent breaches.



Network Segmentation

Dividing a computer network into smaller, isolated segments to enhance security and limit the spread of threats.

Example: A company separates its customer database from its employee network so that a breach in one area doesn't affect the other.



Network Sniffing

The process of capturing and analysing data packets on a network to identify potential threats or gather information.

Example: A security analyst uses a network sniffer to detect unauthorised data transfers.



Network Switch

A hardware device that connects devices on a local area network (LAN) and uses MAC addresses to forward data to the correct destination.

Example: The office network uses a switch to connect multiple computers and printers for efficient communication.

See also: Network, Hardware



LAN (Local Area Network)

A network of interconnected computers and devices within a limited geographical area such as a home, office, or building. LANs enable resource sharing, such as files, printers, and internet access, among connected devices.

Example: The office LAN was upgraded for faster file sharing.

See also: Network, VLAN



NAC (Network Access Control)

Security measures that restrict access to a network based on user identity, device security, and compliance with policies.

Example: Only devices with up-to-date antivirus software are allowed to connect to the company's network.



NAS (Network Attached Storage)

A dedicated file storage device connected to a network, allowing multiple users to access and share data centrally.

Example: A small office in Sydney uses a NAS to store shared documents and backups accessible to all staff.

See also: Hardware



NAT (Network Address Translation)

Used by routers to allow multiple devices on a local network to share a single public IP address.

Example: The home router uses NAT so that all connected devices can access the internet using one external IP address.

See also: Public IP Address



NBN (National Broadband Network)

A government-owned initiative in Australia designed to provide high-speed internet access to homes and businesses through a mix of technologies including fibre optic, fixed wireless, and satellite. The NBN aims to improve national connectivity and support digital services across urban and regional areas.

Example: After switching to the NBN, their household experienced faster and more reliable internet for streaming and remote work.

See also: Broadband



PNG (Portable Network Graphics)

A raster image file format that supports lossless compression and transparency, often used for web graphics and digital images requiring high quality.

Example: She saved the logo as a PNG to preserve its transparency on the website.



SAN (Storage Area Network)

A high-speed network that provides access to consolidated block-level storage, typically used in data centres.

Example: A Sydney-based data centre uses a SAN to provide scalable and reliable storage to multiple servers.



VLAN (Virtual Local Area Network)

A Virtual Local Area Network (VLAN) is a logical grouping of devices on the same physical network that are segmented into separate broadcast domains for improved management and security.

Example: The IT team created separate VLANs for staff and student devices within the school network to enhance security and control.

See also: LAN, Network



VPN (Virtual Private Network)

A technology that securely extends a private network across a public network, allowing users or multiple networks to connect as if they were directly linked to the private network. A VPN creates an encrypted tunnel that protects data integrity and confidentiality while in transit. This enables remote users to securely access private resources and allows organisations to securely connect multiple office locations over the internet.

Example: A company uses a VPN to connect its headquarters' network with branch offices, allowing employees to share resources and data securely between locations.

See also: Tunnelling, VPN Service



WAN (Wide Area Network)

A Wide Area Network (WAN) is a network that connects computers and other devices across large distances, often using public or private communication links to span cities, states, or countries.

Example: A large business in Australia uses a WAN to connect its branch offices across different states.

See also: Network, LAN



Access Point

A hardware device, such as a router or hub, that allows Wi-Fi enabled devices to connect to a wired network, providing wireless access within a defined area.

Example: The university installed multiple access points to ensure stable Wi-Fi coverage across campus.

See also: Wi-Fi, Peripheral, Hardware



Advanced Persistent Threat (APT)

A prolonged, targeted cyberattack where an intruder gains unauthorised access to a network and remains undetected for an extended period, often to steal sensitive data.

Example: A hacker group infiltrates a government agency's network and remains hidden for months, slowly exfiltrating classified documents.



Air Gap

A security measure where a system or network is physically isolated from other networks, especially the internet, to protect against cyber attacks.

Example: Highly sensitive government computers are kept offline to prevent external hacking attempts.



Bandwidth

The maximum amount of data that can be transmitted over a network connection in a specific period, usually measured in megabits per second (Mbps), affecting the speed and capacity of internet connections.

Example: Streaming multiple HD videos simultaneously consumed a large portion of their available bandwidth.



Blacklisting

A security strategy where specific applications, users, IP addresses, or processes that are known to be malicious or unauthorised are explicitly blocked from accessing a system, network, or resource. Everything not included on the blacklist is allowed by default, but may still be monitored for suspicious activity.

Example: A web server's firewall blacklists IP addresses associated with repeated unauthorised login attempts to prevent further access.

See also: Whitelisting



Blue Team

A group responsible for defending an organisation's systems and networks by identifying and mitigating security threats.

Example: The blue team monitors network traffic for suspicious activity and responds to any detected threats.

See also: Red Team, Purple Team



Botnet

A network of internet-connected devices infected with malware and controlled by a central attacker. Botnets are often used for large-scale attacks like DDoS (Distributed Denial-of-Service).

Example: Thousands of infected computers are used simultaneously to overwhelm a website, making it crash.

See also: DDoS, Zombie Computer



Broadband

A high-speed internet connection that provides fast and continuous access to online services, typically delivered via technologies such as DSL, cable, fibre optic, or satellite. In Australia, broadband is commonly provided through the National Broadband Network (NBN), which aims to deliver improved internet performance across the country.

Example: The government subsidised regional broadband to improve internet access in remote communities through the NBN.

See also: NBN, ADSL, SDSL



CLI (Command Line Interface)

The Command Line Interface (or CLI) is a text-based user interface that allows users to interact with a computer system by typing commands.

Example: A system administrator used the CLI to configure network settings on a Linux server.

See also: Terminal



Cyber Espionage

The act of secretly obtaining sensitive information from individuals, organisations, or governments for strategic advantage.

Example: Hackers infiltrate a tech company's network to steal trade secrets about a new product.



Data Exfiltration

The unauthorised transfer of data from a computer or network to an external location, often performed stealthily.

Example: An attacker gains access to a company's database and secretly sends customer records to a remote server.



Data Packet

A small unit of data transmitted over a network that includes both the actual data and metadata such as destination address and sequence information. Data is broken into packets for efficient transfer and reassembled upon arrival.

Example: During a video call, data packets were lost due to a weak Wi-Fi connection.



DHCP (Dynamic Host Configuration Protocol)

A network protocol that automatically assigns IP addresses and other network settings to devices on a network.

Example: When a laptop connects to a school Wi-Fi network, the DHCP server assigns it an IP address for internet access.

See also: IP Address



Directory / Folder

A virtual container or folder used to organise and store files on a computer or network. Directories help keep data structured and can include subdirectories within them.

Example: The images were stored in a separate directory on the server.



Dynamic IP Address

An IP address that is automatically assigned to a device by a network using DHCP (Dynamic Host Configuration Protocol) and may change over time. Dynamic IP addresses are commonly used for home internet connections and general-purpose devices.

Example: Her home router was assigned a dynamic IP address by the internet provider, which changed after a reboot.

See also: IP Address, Static IP Address



Eavesdropping Attack

An attack where a hacker intercepts private communications, such as emails or phone calls, to steal sensitive information.

Example: An attacker uses a packet sniffer to capture login credentials sent over an unencrypted Wi-Fi network.



EDR (Endpoint Detection and Response)

A security solution that continuously monitors endpoint devices (such as computers, servers, and mobile devices) for suspicious activity, detects threats, and responds to security incidents in real time.

Example: EDR software detects and stops malware on an employee's laptop before it can spread to the network.

See also: MDR, Endpoint



Endpoint

Any device that connects to a network and serves as a potential entry point for cyber threats, such as computers, servers, smartphones, tablets, IoT devices, and workstations.

Example: A company implements endpoint security measures on all employee laptops and mobile devices to prevent malware infections and unauthorised access.



Ethernet

A standard wired networking technology commonly used in homes and offices to connect devices within a Local Area Network (LAN).

Example: The desktop was connected to the internet via an Ethernet cable.



Event Log

A system-generated file that records events related to hardware, software, or security on a device or network for diagnostic and monitoring purposes.

Example: The administrator checked the event log after the system crash.



Extranet

A restricted network that allows external parties, such as partners or suppliers, limited access to an organisation's internal systems and data.

Example: The company used an extranet to share data with its suppliers.



File

A unit of digital information stored on a computer or network, containing text, images, audio, video, or other data types.

Example: She uploaded the file to the company server.



File Sharing

The distribution or access provision of digital files over a network, either publicly or within authorised groups.

Example: File sharing was used to distribute meeting documents.



Firewall

A security system (hardware or software) that monitors and controls incoming and outgoing network traffic based on security rules.

Example: Your home router may have a firewall that only allows authorised traffic through.



FTP (File Transfer Protocol)

A standard method for uploading or downloading files between computers over the internet or a network.

Example: They used FTP to upload files to the web server.



Gateway

A hardware or software component that acts as a bridge between different networks, managing traffic and translating protocols.

Example: The network gateway provided access to the internet.



ICMP (Internet Control Message Protocol)

A network protocol used to send error messages and operational information, commonly used by tools like ping and traceroute.

Example: A technician uses ICMP to test network connectivity by sending ping requests to a remote server.

See also: Ping



IDS (Intrusion Detection System)

A security system that monitors network traffic for suspicious activities and alerts administrators if potential threats are detected.

Example: An IDS identifies an unusual number of login attempts from different countries and warns the security team about a possible attack.



Internet

A global network of interconnected computers and servers that communicate using standard protocols to share information and resources. It enables access to services such as websites, email, and file sharing across the world.

Example: The internet is used for communication, information, and entertainment.



Intranet

A private network accessible only to an organisation's members, employees, or authorised users. It uses internet technologies to share information, resources, and collaboration tools securely within the organisation.

Example: The company used its intranet to distribute internal memos and project updates.



IoT (Internet of Things)

A network of connected devices that can collect and exchange data, such as smart home gadgets and industrial sensors.

Example: A smart thermostat that you control via a mobile app is part of the IoT.



IP Address

Internet Protocol Address; a unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. It identifies and locates devices on the network, allowing data to be routed correctly.

Example: The IP address 192.168.1.1 is commonly used for routers.

See also: IPv4, IPv6



IP Blacklist

A list of IP addresses that are blocked due to malicious activity or policy violations.

Example: A company blacklists IP addresses linked to spam emails to protect its network.



Kerberos

A network authentication protocol that uses tickets to allow secure communication over an insecure network.

Example: Employees in a company network use Kerberos to securely access shared resources without repeatedly entering passwords.



Lag

A noticeable delay between a user's action and the response by a system, often caused by network latency, insufficient processing power, or high system load. Lag is commonly experienced in online gaming or video conferencing.

Example: There was significant lag during the video call due to a slow internet connection.



Latency

The delay between a user's action and the response from a network or system, typically measured in milliseconds. In networking, it refers to the time it takes for data to travel from the source to the destination.

Example: High latency caused lag during the video call.



Login

The process of gaining access to a computer or network by entering credentials.

Example: He entered his username and password to login.



MAC Address

A Media Access Control (MAC) Address is a unique identifier assigned to a network interface card (NIC) for communication on a physical network segment.

Example: The technician used the MAC address to allow the student's laptop to connect to the university's secure WiFi network.

See also: Network, NIC



MDR (Managed Detection and Response)

A cybersecurity service where a third-party provider actively monitors, detects, and responds to security threats on behalf of an organisation. MDR services combine human expertise with automated tools to provide continuous threat protection.

Example: A small business without an in-house security team subscribes to an MDR service that continuously monitors its network and alerts the company when suspicious activity is detected.

See also: EDR, Endpoint



MitM (Man-in-the-Middle) Attack

An attack where a cybercriminal intercepts and possibly alters communication between two parties without their knowledge.

Example: An attacker intercepts data transferred between your laptop and a public Wi-Fi network, stealing login credentials for your email.



MSP (Managed Service Provider)

A third-party company that provides ongoing IT management and support services, including system monitoring, maintenance, cybersecurity, and helpdesk support, typically on a subscription basis.

Example: A small business hires an MSP to manage its IT infrastructure, ensuring that its network, cloud services, and cybersecurity measures are maintained and up to date.

See also: MSSP



MSSP (Managed Security Services Provider)

A specialised type of MSP that focuses on cybersecurity, offering services such as threat monitoring, incident response, vulnerability assessments, and endpoint protection.

Example: A business hires an MSSP to monitor its network for cyber threats, protect its servers and workstations from malware, and provide rapid response to security incidents, reducing the risk of financial and operational disruptions.

See also: MSP



Node

A connection point within a network, such as a computer or device.

Example: Each printer and workstation is a node in the network.



Offline

Not connected to the internet or a network.

Example: He worked offline while travelling without Wi-Fi.



Online

Connected to the internet or a network.

Example: Students submitted their assignments online through the portal.



Packet

A small unit of data transmitted over a network, containing both the payload (the actual data) and control information such as source and destination addresses.

Example: The video was streamed by sending thousands of data packets over the internet.



Packet Filtering

A firewall technique that controls the flow of data packets based on predefined security rules, such as IP addresses and ports.

Example: A firewall blocks packets from an unknown IP address trying to access the company network.



Packet Loss

Packet Loss occurs when data packets travelling across a network fail to reach their destination, which can result in reduced performance, delays, or interruptions.

Example: During a video call, the user experienced audio issues due to packet loss caused by an unstable internet connection.

See also: Packet



Peer-to-Peer (P2P)

A network model where computers, called peers, connect directly to each other to share resources without relying on a central server.

Example: File sharing apps often use peer-to-peer networks.



Penetration Testing

A simulated cyber attack performed by security experts (ethical hackers) to identify vulnerabilities in a system or network.

Example: A company hires a penetration tester to attempt to break into their network, uncovering weak points that need to be secured.

See also: Penetration Tester



Ping

A network utility that tests connectivity between two devices by sending ICMP echo requests and measuring response time.

Example: The technician pings google.com to verify that the internet connection is active on the client’s machine.

See also: ICMP



Port

A numerical identifier in networking used to direct data to specific applications or services on a device. Ports enable multiple programs to use the network simultaneously without interference.

Example: The firewall blocked external access to port 21.



Port Scanning

A technique used to identify open ports and services on a network, often as a reconnaissance step before an attack.

Example: Hackers scan a company's network for open ports to find vulnerable services.



QoS

Quality of Service (QoS) is a networking feature that prioritises certain types of traffic to ensure reliable performance, especially for time-sensitive data like voice or video.

Example: The network administrator enabled QoS to prioritise video conferencing traffic over general web browsing in the office.

See also: Bandwidth, Network



Remote Access

The ability to connect to and use a computer or network from a different location through the internet or another network, often for administration, support, or telework.

Example: IT staff use remote access to troubleshoot employee computers.



Risk Assessment

The process of identifying, analysing, and evaluating potential security risks to determine their impact and the steps needed to mitigate them.

Example: A company performs a risk assessment to identify vulnerabilities in its network and prioritises fixing the most critical issues.

See also: Vulnerability Assessment



Rogue Access Point

An unauthorised Wi-Fi access point installed on a network, often used by attackers to intercept traffic.

Example: A hacker sets up a rogue access point in a coffee shop to steal data from users who connect.



Router

A networking device that forwards data packets between computer networks, typically connecting a local network to the internet and managing traffic within the network.

Example: They reset the router to fix the Wi-Fi connection.



Sandboxing

A security technique that isolates applications, processes, or files in a controlled environment to prevent them from affecting the main system. This method allows security professionals or systems to test or analyse suspicious code safely without risking harm to the primary network or data.

Example: Before deploying a new software update, the IT team runs it in a sandbox environment to check for potential vulnerabilities or compatibility issues.



Server

A computer system that provides services or resources to other devices on a network.

Example: The website is hosted on a secure server.



SOC (Security Operations Centre)

A centralised team that monitors, detects, and responds to security incidents in real time.

Example: A bank's SOC monitors its network 24/7 to detect and respond to cyber threats.



SSL (Secure Sockets Layer)

SSL (Secure Sockets Layer) = A cryptographic protocol designed to establish a secure and encrypted connection between two systems over a network. SSL ensures that data transmitted between these systems remains confidential, authenticated, and protected from interception or tampering. While commonly associated with securing communication between web browsers and web servers (HTTPS), SSL can also secure email communications, file transfers, instant messaging, and other network services. Although SSL has been largely replaced by its successor, TLS (Transport Layer Security), the term "SSL" is still widely used to refer to secure communication protocols.

Example: When you see a padlock icon in your browser's address bar, it indicates the website is using SSL/TLS encryption.

See also: TLS, SSL Certificate



Static IP Address

An IP address that is manually assigned to a device and does not change over time. Static IP addresses are often used for servers, network equipment, or any device that needs a consistent address for reliable access.

Example: The business assigned a static IP address to its web server to ensure consistent remote access.

See also: IP Address, Dynamic IP Address



Subnet

A logically segmented portion of a larger network, used to improve performance and manageability by dividing IP address space.

Example: The IT department creates a subnet for the accounting team to isolate their network traffic from other departments.

See also: Network



Subnet Mask

A Subnet Mask is a 32-bit number used in IP networking to divide an IP address into network and host portions, helping determine which devices are on the same local network.

Example: The technician configured the router with a subnet mask of 255.255.255.0 to define the local network range.

See also: Subnet, Network



Threat Hunting

The proactive process of searching for cyber threats or attackers within a network, often using advanced tools and techniques to identify hidden threats.

Example: A security analyst reviews system logs and network traffic to detect unusual activity that may indicate a hidden attack.



Threat Surface

The total sum of all possible vulnerabilities, entry points, or attack vectors in a system that an attacker could exploit.

Example: A company identifies its threat surface as including its website, email server, customer database, employee laptops and devices, point-of-sale (POS) systems, Wi-Fi network, cloud services, cloud storage, and remote work tools.



Threat Vector

The method or pathway used by an attacker to exploit a vulnerability and gain unauthorised access to a system or network.

Example: Phishing emails and infected USB drives are common threat vectors used to deliver malware to an organisation's network.



TLS (Transport Layer Security)

TLS (Transport Layer Security) = A cryptographic protocol designed to provide secure and encrypted communication between two systems over a network. TLS ensures data confidentiality, integrity, and authentication during transmission, protecting it from interception, tampering, or forgery. TLS is the successor to SSL (Secure Sockets Layer) and offers improved security, stronger encryption algorithms, and better performance. It is widely used to secure web traffic (HTTPS), email communications, file transfers, instant messaging, and other network-based services.

Example: Websites with HTTPS use TLS to protect data during transactions, such as online banking or shopping.

See also: SSL



Traffic Analysis

The process of monitoring and examining network traffic to detect patterns, anomalies, or potential security threats.

Example: Analysts notice an unusual amount of data being sent to an external server, indicating potential data exfiltration.



Tunnelling

The process of sending data through a secure, encrypted channel within a network, often used in VPNs.

Example: A remote worker uses a VPN to tunnel their internet traffic securely through the company's network.

See also: VPN



Upload

The process of sending data from a local device to a remote server or system over a network, typically the internet.

Example: She uploaded her resume to the job application website.

See also: Download



UTM (Unified Threat Management)

A security solution that integrates multiple protective measures, such as firewall, antivirus, and intrusion detection, into a single platform.

Example: A small business uses a UTM device to protect its network from malware, phishing, and unauthorised access.



Vulnerability

A weakness or flaw in a system, network, or software that can be exploited by attackers to gain unauthorised access or cause damage.

Example: An outdated version of a web browser with unpatched vulnerabilities allows an attacker to install malware on your device.



Vulnerability Assessment

The systematic process of identifying and evaluating weaknesses in a system or network to determine potential risks.

Example: An IT team conducts a vulnerability assessment and finds outdated software that needs patching.

See also: Risk Assessment



Vulnerability Management

The ongoing process of identifying, assessing, prioritising, and remediating security vulnerabilities in systems.

Example: An IT team scans the network on a weekly basis for vulnerabilities and applies patches to keep systems secure.



Whitelisting

A security strategy where only explicitly approved applications, users, IP addresses, or processes are allowed access to a system, network, or resource. Everything not included on the whitelist is automatically blocked by default, reducing the attack surface and limiting potential threats.

Example: A company's IT department whitelists specific software applications on employee computers, ensuring that only approved programs can run on the network.

See also: Blacklisting



Wi-Fi / WiFi

A wireless networking technology that allows devices to connect to the internet or a network without physical cables.

Example: The cafe offered free Wi-Fi for customers to browse the internet.



WiFi Pineapple

A WiFi Pineapple is a network auditing tool used for penetration testing wireless networks by mimicking legitimate WiFi access points and intercepting traffic.

Example: A cyber security consultant uses a WiFi Pineapple to test for vulnerabilities in a corporate wireless network.

See also: Wi-Fi



Wireless Security

Protective measures to secure wireless networks, such as encryption, passwords, and authentication protocols.

Example: Enabling WPA3 encryption on your home Wi-Fi network to prevent unauthorised access.



Worm

A type of malware that replicates itself and spreads to other devices, often causing widespread network disruption.

Example: The "ILOVEYOU" worm spread through email attachments, infecting millions of computers worldwide by replicating itself.



Wormhole Attack

A network security attack where an attacker captures data packets at one location in a network, tunnels them to another location, and then replays them, disrupting communication or bypassing security measures. This attack is commonly seen in wireless networks, such as ad hoc or sensor networks.

Example: In a corporate Wi-Fi network, an attacker sets up rogue devices to intercept data packets from employees' laptops, tunnels them to a remote server, and replays them to gain unauthorised access to confidential business data.

See also: Replay Attack



XDR (Extended Detection and Response)

An advanced security solution that integrates multiple security layers (such as endpoint, network, cloud, and email security) into a unified platform to provide enhanced threat detection and response capabilities.

Example: An XDR platform detects a phishing email sent to an employee, tracks the related network activity, and automatically blocks any malicious connections to prevent data exfiltration.

See also: EDR, MDR, Endpoint