Glossary of terms and definitions for IT (Information Technology), the Internet and cyber security.
This glossary provides more than 480 clear and concise definitions of commonly used terms in the fields of information technology, the internet, and cyber security. It is designed to support users of all levels in understanding key concepts, technical jargon, and acronyms frequently encountered across digital platforms and security-related discussions. Whether you are a business owner, student, professional, or simply interested in the digital landscape, this resource aims to enhance your knowledge and confidence in navigating the ever-evolving world of technology.
A secret cryptographic key used to decrypt data or create digital signatures, kept confidential by its owner to ensure security.
Example: Only the recipient can decrypt the message with their private key.
See also: Public Key, Encryption
A cryptographic key shared openly to encrypt data or verify digital signatures, paired with a private key in asymmetric encryption.
Example: The sender used the public key to encrypt the file.
See also: Private Key, Encryption