Glossary of terms and definitions for IT (Information Technology), the Internet and cyber security.
This glossary provides more than 480 clear and concise definitions of commonly used terms in the fields of information technology, the internet, and cyber security. It is designed to support users of all levels in understanding key concepts, technical jargon, and acronyms frequently encountered across digital platforms and security-related discussions. Whether you are a business owner, student, professional, or simply interested in the digital landscape, this resource aims to enhance your knowledge and confidence in navigating the ever-evolving world of technology.
A secret string of characters used to authenticate a user.
Example: He changed his password after a security alert.
See also: Credentials, Password Manager
A software tool that securely stores and generates strong, unique passwords for different accounts.
Example: An employee uses a password manager to create and store unique, complex passwords for each of their work-related accounts, ensuring they don't need to remember every password individually.
See also: Password, Credentials
A set of rules designed to create strong, secure passwords and enforce regular password changes.
Example: A company requires employees to use passwords with at least 12 characters, including numbers and symbols.
A security measure requiring two distinct forms of verification before granting access to a system or account. (Also known as: Two-Step Verification)
Example: When logging into an email account, you enter your password and then input a verification code sent to your email.
See also: MFA, Authentication
The process of verifying the identity of a user, system, or device, typically using credentials such as passwords, biometrics, or security tokens, to grant access to secure systems or information.
Example: Logging into your email by entering a username and a password.
See also: Credentials, 2FA, MFA
Measures to protect the BIOS (Basic Input/Output System) from unauthorised changes or tampering.
Example: Enabling a BIOS password prevents unauthorised users from making changes to system settings.
A trial-and-error method where an attacker tries every possible password combination to gain access to an account.
Example: A hacker uses automated software to guess the password to your email by systematically trying every combination of letters and numbers.
A username and password that has been stolen or exposed, allowing unauthorised access to accounts.
Example: Hackers use compromised credentials from a data breach to log into victims' email accounts.
The authentication information used to verify a user's identity, typically consisting of a username and password, and sometimes additional factors.
Example: Accessing the university's student portal requires entering valid credentials, including a student ID and password.
A type of cyber attack where attackers use large sets of stolen username and password combinations, often obtained from previous data breaches, to gain unauthorised access to multiple online accounts. This attack exploits the common practice of people reusing the same credentials across different platforms and services.
Example: After acquiring a database of stolen login credentials from a breached e-commerce website, attackers attempt to access users' social media and banking accounts using the same email and password combinations.
The process of gaining access to a computer or network by entering credentials.
Example: He entered his username and password to login.
A security method that requires users to provide two or more verification factors to access an account or system.
Example: Logging into your banking app by entering your username and password and then confirming a code sent to your mobile phone.
See also: 2FA, Authentication
Manipulating people into performing actions or divulging confidential information by exploiting human psychology rather than technical vulnerabilities.
Example: An attacker calls an employee, pretending to be from IT support, and tricks them into revealing their password.
A unique identifier used in combination with a password to authenticate a user when accessing a computer system or service.
Example: To log into the university portal, a student must enter their assigned username and password.
See also: Credentials