Data Security Glossary

The terms in this glossary relate to different aspects of computer security, data privacy, and online safety. It’s important to understand these concepts to protect yourself and your personal information while using the Internet.

  • Ad blocker πŸ›‘οΈ: A tool that prevents advertisements from appearing on websites or apps.
    Example: I installed an ad blocker on my browser to avoid being interrupted by annoying pop-up ads.
  • Baiting 🍬: A tactic used by hackers to lure people into giving away their personal information.
    Example: The hacker used baiting tactics by sending an email with a fake link to a website that looked like my bank’s website, asking me to enter my login details.
  • Cookies πŸͺ: Small pieces of data that are stored on a user’s computer to track their online activity.
    Example: The website uses cookies to remember my login details and preferences.
  • Copyright laws ©️: Legal rules that protect the rights of creators of original works.
    Example: The author’s book is protected by copyright laws so that nobody can publish or distribute it without permission.
  • Cyber attack πŸ’»: An attempt to gain unauthorized access to a computer system or network.
    Example: The company’s server was under a cyber attack by hackers trying to steal customer data.
  • Cyberstalking πŸ•΅οΈβ€β™€οΈ: When someone uses the Internet to follow or harass another person repeatedly.
    Example: The victim reported to the police that someone was cyberstalking her by sending her threatening messages and following her on social media.
  • Data breach πŸ”“: When personal or sensitive information is accessed or stolen by someone who shouldn’t have access to it.
    Example: The company’s database was hacked, resulting in a data breach that exposed customers’ personal information.
  • Data mining ⛏️: Collecting and analyzing large amounts of data to find patterns or relationships.
    Example: The data mining process helped the company identify customer preferences and improve their marketing strategy.
  • Data permanence πŸ“‰: The fact that data can remain on the Internet forever, even if the user tries to delete it.
    Example: Even though I deleted my social media account, some of my posts are still visible due to data permanence.
  • Data privacy πŸ”’: The right to keep personal information private and secure.
    Example: The company ensures data privacy by encrypting and securely storing customers’ personal information.
  • Data security πŸ”: The measures taken to protect data from unauthorized access or theft.
    Example: The company implemented strict data security measures to prevent cyber-attacks and data breaches.
  • Deepfake 🀳: A video or image that has been manipulated to show something that never actually happened.
    Example: The deepfake video made it seem like the politician said something controversial, but it was actually fake.
  • Digital content πŸ’»: Any type of media that is created and shared digitally, such as videos, music, and images.
    Example: The digital content on the website includes videos, podcasts, and images.
  • Digital footprint 🐾: The information that is left behind by a user’s online activity.
    Example: Your digital footprint includes your social media activity, online purchases, and search history.
  • Digital identity πŸ‘€: The collection of personal information and online activity that is associated with a specific user.
    Example: Your digital identity includes your name, address, phone number, and email address, as well as your online activity.
  • Encryption πŸ”‘: A technique used to protect data by making it unreadable to anyone who doesn’t have the key to unlock it.Β 
    Example: The company uses encryption to protect their sensitive data from unauthorized access or theft.
  • End-user agreement πŸ“„: A legal document that outlines the terms and conditions of using a specific software or service.Β 
    Β Example: I read and agreed to the end-user agreement before downloading the software to ensure I understood the terms and conditions.
  • Fraud πŸ•΅οΈβ€β™‚οΈ: A deliberate attempt to deceive someone for personal gain.Β 
    Β Example: The email claiming that I won a lottery was a fraud, attempting to trick me into providing my bank details.
  • Firewall πŸšͺ: A program or device that blocks unauthorized access to a computer or network.Β 
    Example: The company’s firewall blocks incoming traffic from unauthorized sources, preventing cyber attacks.
  • Hacking πŸ€–: The act of gaining unauthorized access to a computer system or network.Β 
    Example: The hacker gained access to the company’s database by hacking into their network.
  • Hoax (e.g., fake news) πŸ™…β€β™‚οΈ: False information that is spread intentionally to deceive people.Β 
    Example: The news article claiming that a celebrity had died was a hoax, attempting to get clicks and views.
  • Identify theft πŸ‘₯: When someone steals another person’s personal information for fraudulent purposes.Β 
    Example: The thief used my stolen identity to open credit card accounts and make fraudulent purchases.
  • Impersonation 🎭: Pretending to be someone else online to deceive others.Β 
    Example: The scammer impersonated a bank employee to trick me into providing my login details.
  • Network traffic πŸ“ˆ: The flow of data between devices on a network.Β 
    Example: The network traffic increased during peak hours, causing slow internet speed.
  • Online wallet πŸ’°: A digital storage space for storing cryptocurrency.Β 
    Example: I use an online wallet to store my cryptocurrency securely and make transactions.
  • Password πŸ”‘: A secret combination of letters, numbers, and symbols used to access a computer system or network.Β 
    Example: I created a strong password by using a combination of upper and lowercase letters, numbers, and symbols.
  • Password manager πŸ—οΈ: A tool that helps users store and manage their passwords securely.Β 
    Example: I use a password manager to securely store and manage my numerous passwords.
  • Phishing 🎣: A method used by hackers to get personal information from people by pretending to be a trustworthy entity or person.Β 
    Example: The phishing email pretending to be my bank asked me to provide my login details, but it was a scam.
  • Portability πŸ“¦: The ability to move data and applications between different devices and systems securely.Β 
    Example: The cloud technology allows for data portability, enabling users to access their data from any device.
  • Privacy-focused browser πŸ”: A web browser that is designed to protect the user’s privacy and security.Β 
    Example: I use a privacy-focused browser to protect my online privacy and prevent tracking.
  • Privacy settings πŸ”’: The controls that allow users to manage how their personal information is shared and used online.Β 
    Example: I adjusted my privacy settings on social media to control who can see my posts and personal information.
  • Ransomware πŸ’°: Malware that encrypts a user’s files and demands payment in exchange for unlocking them.Β 
    Example: The company’s computer system was infected with ransomware, which encrypted their files and demanded payment to unlock them.
  • Scalability πŸ“ˆ: The ability of a system to handle increasing amounts of data or traffic without compromising security.Β 
    Example: The company’s scalable cloud infrastructure allows it to handle increasing amounts of traffic without compromising security.
  • Security πŸ”’: The measures taken to protect computer systems and networks from unauthorized access, theft, or damage.Β 
    Example: The company’s security measures include firewalls, antivirus software, and regular data backups to protect against cyber-attacks and data breaches.
  • Social engineering πŸ§™β€β™‚οΈ: A way of manipulating people into giving away sensitive information or doing something they wouldn’t normally do.Β 
    Example: The social engineering tactic used by the scammer involved pretending to be a friend in need to trick me into sending money.
  • Spoofing 🎭: Pretending to be someone else online to deceive others.Β 
    Example: The email pretending to be from a reputable company was a spoofing attempt to trick me into providing personal information.
  • Terms of service πŸ“„: The legal agreement between a user and a service provider that outlines the terms and conditions of using the service.Β 
    Example: The terms of service for the online shopping platform include rules for payments, shipping, and returns.
  • Third-party πŸ‘₯: A person or organization that is not directly involved in a transaction or agreement.
    Example: The company’s customer data was leaked to a third party who was not authorized to access it.
  • Tracking πŸ‘€: The practice of monitoring a user’s online activity.Β 
    Example: The website uses tracking cookies to monitor my online activity and show me personalized ads.
  • Two-factor authentication πŸ”’: A security measure that requires two forms of identification to access a computer system or network.Β 
    Example: The company’s two-factor authentication process includes a password and a verification code sent to my phone to ensure secure access.
  • Usability πŸ€–: The ease with which a computer system or network can be used securely and efficiently by its intended users.
    Example: The company’s user-friendly and secure software ensures high usability and productivity.
  • Virtual Private Network (VPN) 🌐: A tool that creates a secure, encrypted connection between a user’s computer and a private network, allowing the user to access the Internet securely and privately.Β 
    Example: I use a VPN to access my company’s private network securely and protect my online privacy.
  • WiFi packet sniffing πŸ“‘: The practice of intercepting and analyzing data packets sent over a wireless network.
    Example: The hacker used WiFi packet sniffing to intercept and steal sensitive information sent over the company’s wireless network.