Glossary of terms and definitions for IT (Information Technology), the Internet and cyber security.
This glossary provides more than 480 clear and concise definitions of commonly used terms in the fields of information technology, the internet, and cyber security. It is designed to support users of all levels in understanding key concepts, technical jargon, and acronyms frequently encountered across digital platforms and security-related discussions. Whether you are a business owner, student, professional, or simply interested in the digital landscape, this resource aims to enhance your knowledge and confidence in navigating the ever-evolving world of technology.
A wireless networking technology that allows devices to connect to the internet or a network without physical cables.
Example: The cafe offered free Wi-Fi for customers to browse the internet.
A security protocol designed to protect wireless networks by encrypting data and ensuring secure communication.
Example: WPA3 encryption is used on home Wi-Fi routers to prevent unauthorised access.
Protective measures to secure wireless networks, such as encryption, passwords, and authentication protocols.
Example: Enabling WPA3 encryption on your home Wi-Fi network to prevent unauthorised access.
A hardware device, such as a router or hub, that allows Wi-Fi enabled devices to connect to a wired network, providing wireless access within a defined area.
Example: The university installed multiple access points to ensure stable Wi-Fi coverage across campus.
See also: Wi-Fi, Peripheral, Hardware
A small unit of data transmitted over a network that includes both the actual data and metadata such as destination address and sequence information. Data is broken into packets for efficient transfer and reassembled upon arrival.
Example: During a video call, data packets were lost due to a weak Wi-Fi connection.
A network protocol that automatically assigns IP addresses and other network settings to devices on a network.
Example: When a laptop connects to a school Wi-Fi network, the DHCP server assigns it an IP address for internet access.
See also: IP Address
An attack where a hacker intercepts private communications, such as emails or phone calls, to steal sensitive information.
Example: An attacker uses a packet sniffer to capture login credentials sent over an unencrypted Wi-Fi network.
A location or device that provides wireless internet access via Wi-Fi, either public or private.
Example: She connected to a public hotspot at the airport.
A company or organisation that offers access to the internet, often used interchangeably with Internet Service Provider (ISP), though sometimes focusing on providing basic internet connectivity.
Example: The café used a local IAP to provide free Wi-Fi to its customers.
An attack where a cybercriminal intercepts and possibly alters communication between two parties without their knowledge.
Example: An attacker intercepts data transferred between your laptop and a public Wi-Fi network, stealing login credentials for your email.
A collection of interconnected computers, devices, or systems that communicate and share resources such as data, files, and internet access. Networks can be connected using wired technologies like Ethernet cables or wireless technologies such as Wi-Fi.
Example: The office network included both wired desktop computers and Wi-Fi access for mobile devices.
Not connected to the internet or a network.
Example: He worked offline while travelling without Wi-Fi.
An unauthorised Wi-Fi access point installed on a network, often used by attackers to intercept traffic.
Example: A hacker sets up a rogue access point in a coffee shop to steal data from users who connect.
A networking device that forwards data packets between computer networks, typically connecting a local network to the internet and managing traffic within the network.
Example: They reset the router to fix the Wi-Fi connection.
The total sum of all possible vulnerabilities, entry points, or attack vectors in a system that an attacker could exploit.
Example: A company identifies its threat surface as including its website, email server, customer database, employee laptops and devices, point-of-sale (POS) systems, Wi-Fi network, cloud services, cloud storage, and remote work tools.
A commercial offering provided by third-party companies that allows users to encrypt their internet traffic, mask their IP address, bypass geographical restrictions, or attempt to maintain privacy while browsing the internet. However, while a VPN service can help protect data in transit and obscure a user's location, it carries its own risks and does not guarantee complete anonymity or security from all types of cyber threats.
Example: A user subscribes to a VPN service to encrypt their internet connection while using public Wi-Fi at an airport, preventing potential attackers from intercepting their sensitive information.
See also: VPN
A network security attack where an attacker captures data packets at one location in a network, tunnels them to another location, and then replays them, disrupting communication or bypassing security measures. This attack is commonly seen in wireless networks, such as ad hoc or sensor networks.
Example: In a corporate Wi-Fi network, an attacker sets up rogue devices to intercept data packets from employees' laptops, tunnels them to a remote server, and replays them to gain unauthorised access to confidential business data.
See also: Replay Attack