Innovative Digital Solutions for SMBs

Glossary / Dictionary

Glossary of terms and definitions for IT (Information Technology), the Internet and cyber security.

This glossary provides more than 480 clear and concise definitions of commonly used terms in the fields of information technology, the internet, and cyber security. It is designed to support users of all levels in understanding key concepts, technical jargon, and acronyms frequently encountered across digital platforms and security-related discussions. Whether you are a business owner, student, professional, or simply interested in the digital landscape, this resource aims to enhance your knowledge and confidence in navigating the ever-evolving world of technology.



Software

The programs and operating systems that run on computer hardware and perform specific tasks or functions.

Example: Libre Office is software used for word processing.



Antivirus Software

A program designed to detect, prevent, and remove malicious software (malware) like viruses, worms, and trojans.

Example: Antivirus Software can scan your computer regularly and alert you if it finds a virus.

See also: Software



SaaS (Software as a Service)

Cloud-based software model where applications are hosted by a provider and accessed over the internet, typically by subscription.

Example: The accounting system is provided as SaaS.



Ad Blocker

Software or browser extension that removes or hides online advertisements.

Example: She installed an ad blocker to prevent pop-ups while browsing news sites.



Adware

Software that automatically displays or downloads advertising material when a user is online. While not always malicious, some adware can compromise privacy or security.

Example: The free game came with adware that showed constant banner ads.

See also: Malware



API (Application Programming Interface)

A set of protocols for building and interacting with software applications.

Example: The developer used a weather API to add live forecasts to the app.



Application / App

An Application, or App, is a software program designed to help users perform specific tasks, such as word processing, web browsing, or messaging, and can run on computers, mobile devices, or even in a web browser.

Example: He downloaded a budgeting app to manage his monthly expenses.

See also: Software



Application Whitelisting

Allowing only approved applications to run on a system, blocking all others by default to prevent malware.

Example: A business uses application whitelisting to ensure only verified software runs on employee computers.



Backdoor / Back Door

A hidden method within software, hardware, or a system that allows someone to bypass normal authentication or security controls. Backdoors can be intentionally coded by developers for maintenance purposes or maliciously created by attackers to gain unauthorised access.

Example: A software developer includes a backdoor for troubleshooting, while a hacker might install a backdoor in a compromised server to maintain covert access.



Baiting

Baiting is a social engineering attack where an attacker lures a victim into performing a specific action by offering something tempting, such as free software, a USB drive, or access to exclusive content. The bait often contains malware or leads to a phishing site.

Example: An employee finds a USB drive labelled "Confidential Payroll Data" in the office car park. Curious, they plug it into their work computer, unknowingly installing malware that grants the attacker remote access to the system.



Bot

An automated software program that performs tasks online. Bots can be used for legitimate purposes or malicious activities, such as spamming.

Example: A search engine uses bots to index websites, while cyber criminals use bots to send out spam emails.



Browser

A software application used to access, retrieve, and view content on the World Wide Web, including websites, images, and multimedia, with popular examples being Brave, Chrome, Firefox, and Safari.

Example: He updated his browser to improve compatibility with new web applications.

See also: Software



Brute Force Attack

A trial-and-error method where an attacker tries every possible password combination to gain access to an account.

Example: A hacker uses automated software to guess the password to your email by systematically trying every combination of letters and numbers.



Bug

An error or flaw in software that causes it to behave unexpectedly.

Example: A bug in the app caused it to crash when uploading photos.



CASB (Cloud Access Security Broker)

Software that acts as a gatekeeper between users and cloud services to enforce security policies and protect data.

Example: A CASB monitors and controls employee access to cloud services like Google Drive and Dropbox.



Clickjacking

A technique that tricks users into clicking something different from what they think, often to steal information or install malware.

Example: A deceptive webpage has a "Play" button that actually triggers a hidden download of malicious software.



Cloud Computing

The delivery of computing services such as storage, processing power, databases, and software over the internet, allowing users to access and manage resources on demand without maintaining physical infrastructure.

Example: The organisation adopted cloud computing to reduce IT costs and enable remote access to files.



CMS (Content Management System)

A software platform that enables users to create, manage, and modify digital content on websites without needing advanced technical knowledge.

Example: The council's website was built using a CMS that allowed staff to update pages easily.



CPU (Central Processing Unit)

The main part of a computer that performs most of the processing by executing instructions from software and managing tasks.

Example: Upgrading the CPU improved the computer's performance.



Crash

An unexpected failure of a software program or operating system that causes it to stop functioning properly, often resulting in data loss or the need to restart the system.

Example: The word processor experienced a crash and closed before she could save her document.



Cyber Hygiene

The regular practices and habits that individuals and organisations follow to maintain security and protect against cyber threats.

Example: Regularly updating software, using strong passwords, and enabling multi-factor authentication are good cyber hygiene practices.



Dark Web

A part of the internet that is not indexed by standard search engines and requires special software such as Tor to access. The dark web is often associated with anonymity and is sometimes used for illicit activities, though it also hosts privacy-focused content and communication.

Example: Law enforcement agencies monitor the dark web to investigate cyber crime and illegal trade.



Data Loss Prevention (DLP)

Tools and strategies designed to prevent unauthorised access, use, or sharing of sensitive data.

Example: A company uses DLP software to prevent employees from sending confidential information via email.

See also: Data Loss



Debugging

The process of identifying and fixing errors in software code.

Example: The team spent hours debugging the app before its release.



Driver

A software program that allows the operating system to communicate with hardware devices, enabling proper functionality.

Example: After installing a new graphics card, the user downloads the latest driver to ensure compatibility with games.



Dual Boot

Dual Boot refers to the setup of a computer system to run two different operating systems on separate partitions, allowing the user to choose one at startup.

Example: A developer sets up a dual boot system with Windows 11 and Ubuntu for software testing.



EDR (Endpoint Detection and Response)

A security solution that continuously monitors endpoint devices (such as computers, servers, and mobile devices) for suspicious activity, detects threats, and responds to security incidents in real time.

Example: EDR software detects and stops malware on an employee's laptop before it can spread to the network.

See also: MDR, Endpoint



Endpoint Security

Protective measures and tools designed to secure endpoint devices such as desktops, laptops, tablets, and smartphones from cyber threats. It typically includes antivirus software, firewalls, encryption, and advanced threat detection to prevent unauthorised access and data breaches.

Example: Installing antivirus software and encrypting data on company laptops.

See also: Endpoint



EPP (Endpoint Protection Platform)

Security software that provides comprehensive protection for endpoint devices, combining antivirus, anti-malware, and firewall features.

Example: An organisation installs an EPP on all employee laptops to protect against malware and unauthorised access.

See also: Endpoint



Event Log

A system-generated file that records events related to hardware, software, or security on a device or network for diagnostic and monitoring purposes.

Example: The administrator checked the event log after the system crash.



Exploit

A piece of code or technique that takes advantage of a vulnerability in a system to perform malicious actions.

Example: An attacker uses an exploit to gain access to a server running outdated software.



Exploit Kit

A collection of tools used by cyber criminals to exploit known vulnerabilities in systems or software.

Example: An exploit kit targets unpatched versions of a web browser to install ransomware on users' devices.



Firewall

A security system (hardware or software) that monitors and controls incoming and outgoing network traffic based on security rules.

Example: Your home router may have a firewall that only allows authorised traffic through.



Firmware

Software permanently installed on a hardware device that controls its low-level functions and can be updated for improvements or fixes.

Example: The printer's firmware was updated to fix a bug.



Front End

The part of a software application or website that users interact with directly. It includes the visual layout, design, and elements such as buttons, menus, and text fields, and is typically built using HTML, CSS, and JavaScript.

Example: The front end of the website was redesigned to improve user experience and mobile compatibility.

See also: Back End



Gateway

A hardware or software component that acts as a bridge between different networks, managing traffic and translating protocols.

Example: The network gateway provided access to the internet.



GNU/Linux

An operating system combining the GNU Project's software tools and utilities with the Linux kernel. This combination provides a complete, free, and open-source system used widely for servers, desktops, and various computing devices.

Example: Ubuntu is a popular GNU/Linux distribution used by many developers worldwide.

See also: Operating System



HDD (Hard Disk Drive)

A data storage device used for storing operating systems, software, documents, and other digital files, either internally or externally.

Example: The hard drive failed and all data was lost.

See also: Drive, SSD, NVMe



Hypervisor

Software that allows multiple virtual machines to run on a single physical server, managing their resources and isolation.

Example: VMware and Hyper-V are popular hypervisors used to create and manage virtual machines.

See also: VM (Virtual Machine)



Icon

A small graphical representation or symbol on a computer interface that represents a program, file, function, or command. Icons provide a visual and intuitive way for users to interact with software and operating systems.

Example: He clicked the trash bin icon to delete the file.



Indexing

The process by which search engines or software organise and store data in a structured format to enable fast and efficient retrieval. In the context of websites, indexing refers to a search engine scanning and adding pages to its database.

Example: Search engines use indexing to list relevant web pages.



Installation

This is the process of setting up software or hardware so that it can function correctly on a computer system.

Example: The IT team performs the installation of software on all company laptops.



Interface

A point of interaction where two systems, such as software and hardware, or software components, communicate and exchange information. In user computing, it often refers to the graphical layout through which users interact with a device or application.

Example: The app's user interface was clean and intuitive.



Jailbreak Detection

Software tools that identify if a mobile device has been jailbroken to bypass security restrictions.

Example: A banking app refuses to run if it detects that the device has been jailbroken.

See also: Jailbreaking



Jailbreaking

Removing software restrictions imposed by a device manufacturer to install unauthorised apps or modify system settings.

Example: Jailbreaking an iPhone to install apps not available on the App Store.



Keylogger

Malicious software or hardware that records every keystroke made on a device, often used to capture passwords, credit card details, or other sensitive information.

Example: A cyber criminal installs a keylogger on a public computer, capturing login details from unsuspecting users.



Log File

A file that records events, processes, or messages from software and systems.

Example: The firewall log file showed repeated access attempts.



Malware

A general term for any malicious software designed to damage, disrupt, or exploit computers, networks, or data. Types include viruses, worms, ransomware, and spyware.

Example: A user downloads some free software from an unofficial website, unknowingly installing malware that tracks their keystrokes and steals their login credentials.



MDM (Mobile Device Management)

Software that allows organisations to manage and secure employees' mobile devices remotely.

Example: IT administrators use MDM to enforce security policies on company-issued smartphones.



NAC (Network Access Control)

Security measures that restrict access to a network based on user identity, device security, and compliance with policies.

Example: Only devices with up-to-date antivirus software are allowed to connect to the company's network.



Operating System (OS)

System software that manages computer hardware and software resources, providing a platform for applications to run and offering user interfaces for interaction. Examples include Windows, macOS, and Linux.

Example: The laptop's operating system was upgraded to the latest version for better performance.



Password Manager

A software tool that securely stores and generates strong, unique passwords for different accounts.

Example: An employee uses a password manager to create and store unique, complex passwords for each of their work-related accounts, ensuring they don't need to remember every password individually.

See also: Password, Credentials



Patch

A software update designed to fix security vulnerabilities, bugs, or performance issues.

Example: Microsoft releases a patch to address a security flaw in Windows, which users need to install to stay protected.



Patch Management

The process of regularly updating software to fix security vulnerabilities, bugs, and performance issues.

Example: An IT team applies a security patch to operating systems and applications each month to protect against newly discovered vulnerabilities.

See also: Patch



Patch Tuesday

The second Tuesday of each month when Microsoft releases security updates for its software.

Example: IT departments schedule updates on Patch Tuesday to ensure systems stay secure.

See also: Patch, Patch Management



Payload

The component of malicious software (malware) responsible for executing the intended harmful action, such as data theft, system damage, or unauthorised access, once the malware has infiltrated a system.

Example: A ransomware payload encrypts files on a victim's computer and displays a ransom note demanding payment to restore access.



Platform

A hardware or software environment in which applications run. This can include operating systems, cloud services, or hardware devices.

Example: The app was developed for both Android and iOS platforms.

See also: Operating System



Power Cycle

Power Cycle is the process of turning a device off and then back on again to reset or troubleshoot hardware or software issues.

Example: The user performs a power cycle on the modem to resolve a connection issue.



Privilege Escalation

Exploiting vulnerabilities to gain higher access rights within a system than originally granted, enabling attackers to perform unauthorised actions.

Example: A user with standard access exploits a vulnerability to gain administrator privileges, allowing them to install software or access sensitive files.



Quarantine

The process of isolating infected files, devices, or systems to prevent the spread of malware or other security threats.

Example: Antivirus software detects a suspicious file and places it in quarantine, preventing it from affecting other parts of the system.



Reboot

To restart a computer system.

Example: She had to reboot her laptop after a software update.



Repository

A central location where data or software code is stored and managed.

Example: The source code was stored in a GitHub repository.



RMM (Remote Monitoring and Management)

A software solution that allows IT service providers to remotely monitor, manage, and maintain an organisation's IT infrastructure, including computers, servers, and networks.

Example: An IT provider uses RMM software to monitor the health of a client's servers, automatically deploying security patches and detecting hardware failures before they cause downtime.



Rootkit

Malicious software that grants attackers deep access to a system while hiding its presence, making it difficult to detect.

Example: A rootkit infects a computer and allows an attacker to control the system remotely without the user knowing.

See also: Malware



Sandboxing

A security technique that isolates applications, processes, or files in a controlled environment to prevent them from affecting the main system. This method allows security professionals or systems to test or analyse suspicious code safely without risking harm to the primary network or data.

Example: Before deploying a new software update, the IT team runs it in a sandbox environment to check for potential vulnerabilities or compatibility issues.



Search Engine

A software system that searches the internet or a database for information based on keywords or phrases entered by a user, returning a list of relevant results.

Example: She used a search engine to find a web designer on the Gold Coast.



Secure Boot

A security feature that ensures a device only boots using software trusted by the manufacturer.

Example: If malware tries to alter your computer's boot process, Secure Boot prevents the system from starting.



Security Audit

A thorough review and evaluation of an organisation's security policies, systems, and procedures to identify vulnerabilities, ensure compliance with security standards, and verify the effectiveness of security controls.

Example: A company conducts a security audit to ensure that client records are securely stored, employee devices have up-to-date antivirus software, and access to sensitive files is restricted to authorised staff only.



Spyware

Malicious software that secretly gathers information about a user's activities without their knowledge, often to steal sensitive data.

Example: Spyware installed on a smartphone monitors calls, messages, and location, sending the data to an attacker.

See also: Malware



Token

A digital object used to authenticate users and grant access to systems or services. Tokens can be hardware-based or software-based.

Example: When logging into a secure system, a user may receive a one-time token via a mobile app for verification.



Trapdoor

A hidden method within software that allows bypassing security controls, often planted by developers or attackers.

Example: An unethical programmer adds a trapdoor to a system so they can access it secretly after it's deployed.



Trojan Horse

A type of malware (malicious software) that appears to be legitimate or useful but, once installed, performs hidden malicious activities, such as stealing data, installing additional malware, or providing remote access to attackers.

Example: A user downloads what appears to be a free software program, but once installed, it secretly allows attackers to remotely control the computer.



UAC (User Account Control)

A security feature that helps prevent unauthorised changes to a system by prompting users for permission when actions require administrative privileges.

Example: When you try to install new software on your computer, UAC asks you to confirm the action to prevent malicious installations.



UEM (Unified Endpoint Management)

A solution that manages and secures all types of endpoint devices, such as laptops, mobiles, and tablets, from a single platform.

Example: An IT team uses UEM software to enforce security policies and push updates to all employee devices.

See also: Endpoint



UI (User Interface)

User Interface (UI) is the visual and interactive part of a software application or device that users interact with, including elements like buttons, menus, and layouts.

Example: The design team updated the UI of the mobile banking app to make it cleaner and more user-friendly for customers.

See also: UX



VM (Virtual Machine)

A software-based simulation of a physical computer that allows multiple operating systems to run on the same hardware.

Example: Developers use a virtual machine to test a new application on Windows while running a Mac.

See also: Virtualisation



Vulnerability

A weakness or flaw in a system, network, or software that can be exploited by attackers to gain unauthorised access or cause damage.

Example: An outdated version of a web browser with unpatched vulnerabilities allows an attacker to install malware on your device.



Vulnerability Assessment

The systematic process of identifying and evaluating weaknesses in a system or network to determine potential risks.

Example: An IT team conducts a vulnerability assessment and finds outdated software that needs patching.

See also: Risk Assessment



Web Application

A web application is a software program that runs on a web server and is accessed through a browser over the internet.

Example: The Australian Taxation Office provides a web application for users to lodge their tax returns online.



White Box Testing

A security testing method where the tester has full knowledge of the system's internal structure, code, and logic.

Example: Developers perform white box testing on new software to identify and fix security flaws in the code.



Whitelisting

A security strategy where only explicitly approved applications, users, IP addresses, or processes are allowed access to a system, network, or resource. Everything not included on the whitelist is automatically blocked by default, reducing the attack surface and limiting potential threats.

Example: A company's IT department whitelists specific software applications on employee computers, ensuring that only approved programs can run on the network.

See also: Blacklisting



Zero-Day Exploit

An attack that targets a vulnerability unknown to the software vendor, giving them "zero days" to provide a fix.

Example: An attacker discovers a flaw in a web browser and uses it to steal data before a patch is released.