Innovative Digital Solutions for SMBs

Glossary / Dictionary

Glossary of terms and definitions for IT (Information Technology), the Internet and cyber security.

This glossary provides more than 480 clear and concise definitions of commonly used terms in the fields of information technology, the internet, and cyber security. It is designed to support users of all levels in understanding key concepts, technical jargon, and acronyms frequently encountered across digital platforms and security-related discussions. Whether you are a business owner, student, professional, or simply interested in the digital landscape, this resource aims to enhance your knowledge and confidence in navigating the ever-evolving world of technology.



Packet

A small unit of data transmitted over a network, containing both the payload (the actual data) and control information such as source and destination addresses.

Example: The video was streamed by sending thousands of data packets over the internet.



Packet Filtering

A firewall technique that controls the flow of data packets based on predefined security rules, such as IP addresses and ports.

Example: A firewall blocks packets from an unknown IP address trying to access the company network.



Packet Loss

Packet Loss occurs when data packets travelling across a network fail to reach their destination, which can result in reduced performance, delays, or interruptions.

Example: During a video call, the user experienced audio issues due to packet loss caused by an unstable internet connection.

See also: Packet



Data Packet

A small unit of data transmitted over a network that includes both the actual data and metadata such as destination address and sequence information. Data is broken into packets for efficient transfer and reassembled upon arrival.

Example: During a video call, data packets were lost due to a weak Wi-Fi connection.



Eavesdropping Attack

An attack where a hacker intercepts private communications, such as emails or phone calls, to steal sensitive information.

Example: An attacker uses a packet sniffer to capture login credentials sent over an unencrypted Wi-Fi network.



IP Spoofing

A technique where an attacker falsifies the source IP address of a data packet to disguise their identity or impersonate a trusted source.

Example: An attacker sends a malicious email that appears to come from a colleague's IP address to trick you into clicking a harmful link.