Glossary of terms and definitions for IT (Information Technology), the Internet and cyber security.
This glossary provides more than 480 clear and concise definitions of commonly used terms in the fields of information technology, the internet, and cyber security. It is designed to support users of all levels in understanding key concepts, technical jargon, and acronyms frequently encountered across digital platforms and security-related discussions. Whether you are a business owner, student, professional, or simply interested in the digital landscape, this resource aims to enhance your knowledge and confidence in navigating the ever-evolving world of technology.
A cyber security professional who performs authorised hacking on an organisation's systems, networks, or applications to identify and help fix security vulnerabilities.
Example: A financial institution hires a penetration tester to attempt to break into its online banking platform. The tester discovers a vulnerability that allows unauthorised access to customer accounts and provides a report with recommendations to fix the issue.
See also: Penetration Testing
A simulated cyber attack performed by security experts (ethical hackers) to identify vulnerabilities in a system or network.
Example: A company hires a penetration tester to attempt to break into their network, uncovering weak points that need to be secured.
See also: Penetration Tester