Data security glossary

The terms in this glossary relate to different aspects of computer security, data privacy, and online safety. It’s important to understand these concepts to protect yourself and your personal information while using the internet.

Ad blocker ๐Ÿ›ก๏ธ: A tool that prevents advertisements from appearing on websites or in apps. ๐Ÿ“บ๐Ÿšซ

Example: I installed an ad blocker on my browser to avoid being interrupted by annoying pop-up ads.

Baiting ๐Ÿฌ: A tactic used by hackers to lure people into giving away their personal information. ๐ŸŽฃ๐Ÿ˜ˆ

Example: The hacker used baiting tactics by sending an email with a fake link to a website that looked like my bank’s website, asking me to enter my login details.

Cookies ๐Ÿช: Small pieces of data that are stored on a userโ€™s computer to track their online activity. ๐Ÿ“Š๐Ÿช

Example: The website uses cookies to remember my login details and preferences.

Copyright laws ยฉ๏ธ: Legal rules that protect the rights of creators of original works. ๐Ÿ“œ๐Ÿ‘จโ€๐ŸŽจ

Example: The author’s book is protected by copyright laws, so nobody can publish or distribute it without permission.

Cyber attack ๐Ÿ’ป: An attempt to gain unauthorized access to a computer system or network. ๐Ÿšจ๐Ÿ’ป

Example: The company’s server was under a cyber attack by hackers trying to steal customer data.

Cyberstalking ๐Ÿ•ต๏ธโ€โ™€๏ธ: When someone uses the internet to follow or harass another person repeatedly. ๐Ÿ‘€๐Ÿ“ฑ

Example: The victim reported to the police that someone was cyberstalking her by sending her threatening messages and following her on social media.

Data breach ๐Ÿ”“: When personal or sensitive information is accessed or stolen by someone who shouldnโ€™t have access to it. ๐Ÿšจ๐Ÿ”“

Example: The company’s database was hacked, resulting in a data breach that exposed customers’ personal information.

Data mining โ›๏ธ: Collecting and analyzing large amounts of data to find patterns or relationships. ๐Ÿ”Žโ›๏ธ

Example: The data mining process helped the company identify customer preferences and improve their marketing strategy.

Data permanence ๐Ÿ“‰: The fact that data can remain on the internet forever, even if the user tries to delete it. ๐Ÿ’ป๐Ÿ•ฐ๏ธ

Example: Even though I deleted my social media account, some of my posts are still visible due to data permanence.

Data privacy ๐Ÿ”’: The right to keep personal information private and secure. ๐Ÿ”๐Ÿ‘ค

Example: The company ensures data privacy by encrypting and securely storing customers’ personal information.

Data security ๐Ÿ”: The measures taken to protect data from unauthorized access or theft. ๐Ÿ”’๐Ÿšจ

Example: The company implemented strict data security measures to prevent cyber attacks and data breaches.

Deepfake ๐Ÿคณ: A video or image that has been manipulated to show something that never actually happened. ๐ŸŽฅ๐Ÿ‘จโ€๐Ÿ‘ฉโ€๐Ÿ‘งโ€๐Ÿ‘ฆ

Example: The deepfake video made it seem like the politician said something controversial, but it was actually fake.

Digital content ๐Ÿ’ป: Any type of media that is created and shared digitally, such as videos, music, and images. ๐Ÿ“น๐ŸŽต๐Ÿ“ท

Example: The digital content on the website includes videos, podcasts, and images.

Digital footprint ๐Ÿพ: The information that is left behind by a userโ€™s online activity. ๐Ÿ‘ฃ๐Ÿ’ป

Example: Your digital footprint includes your social media activity, online purchases, and search history.

Digital identity ๐Ÿ‘ค: The collection of personal information and online activity that is associated with a specific user. ๐Ÿ†”๐Ÿ’ป

Example: Your digital identity includes your name, address, phone number, and email address, as well as your online activity.

Encryption ๐Ÿ”‘: A technique used to protect data by making it unreadable to anyone who doesnโ€™t have the key to unlock it. ๐Ÿ”๐Ÿ”‘

ย  ย  ย  ย  Example: The company uses encryption to protect their sensitive data from unauthorized access or theft.

End-user agreement ๐Ÿ“„: A legal document that outlines the terms and conditions of using a specific software or service. ๐Ÿ“๐Ÿค

ย  ย  ย  ย  Example: I read and agreed to the end-user agreement before downloading the software to ensure I understand the terms and conditions.

Fraud ๐Ÿ•ต๏ธโ€โ™‚๏ธ: A deliberate attempt to deceive someone for personal gain. ๐Ÿ˜ˆ๐Ÿ’ฐ

ย  ย  ย  ย  Example: The email claiming that I won a lottery was a fraud, attempting to trick me into providing my bank details.

Firewall ๐Ÿšช: A program or device that blocks unauthorized access to a computer or network. ๐Ÿ›ก๏ธ๐Ÿ”ฅ

ย  ย  ย  ย  Example: The company’s firewall blocks incoming traffic from unauthorized sources, preventing cyber attacks.

Hacking ๐Ÿค–: The act of gaining unauthorized access to a computer system or network. ๐Ÿ‘จโ€๐Ÿ’ป๐Ÿšซ

ย  ย  ย  ย  Example: The hacker gained access to the company’s database by hacking into their network.

Hoax (e.g., fake news) ๐Ÿ™…โ€โ™‚๏ธ: False information that is spread intentionally to deceive people. ๐Ÿ“ฐ๐Ÿคฅ

ย  ย  ย  ย  Example: The news article claiming that a celebrity had died was a hoax, attempting to get clicks and views.

Identify theft ๐Ÿ‘ฅ: When someone steals another personโ€™s personal information for fraudulent purposes. ๐Ÿ‘ฅ๐Ÿ’ณ

ย  ย  ย  ย  Example: The thief used my stolen identity to open credit card accounts and make fraudulent purchases.

Impersonation ๐ŸŽญ: Pretending to be someone else online to deceive others. ๐Ÿ‘ฅ๐ŸŽญ

ย  ย  ย  ย  Example: The scammer impersonated a bank employee to trick me into providing my login details.

Network traffic ๐Ÿ“ˆ: The flow of data between devices on a network. ๐Ÿ“ˆ๐Ÿ’ป

ย  ย  ย  ย  Example: The network traffic increased during peak hours, causing slow internet speed.

Online wallet ๐Ÿ’ฐ: A digital storage space for storing cryptocurrency. ๐Ÿ“ˆ๐Ÿ’ฐ

ย  ย  ย  ย  Example: I use an online wallet to store my cryptocurrency securely and make transactions.

Password ๐Ÿ”‘: A secret combination of letters, numbers, and symbols used to access a computer system or network. ๐Ÿ”๐Ÿ”‘

ย  ย  ย  ย  Example: I created a strong password by using a combination of upper and lowercase letters, numbers, and symbols.

Password manager ๐Ÿ—๏ธ: A tool that helps users store and manage their passwords securely. ๐Ÿ“๐Ÿ”‘

ย  ย  ย  ย  Example: I use a password manager to securely store and manage my numerous passwords.

Phishing ๐ŸŽฃ: A method used by hackers to get personal information from people by pretending to be a trustworthy entity or person. ๐ŸŽฃ๐Ÿ˜ˆ

ย  ย  ย  ย  Example: The phishing email pretending to be my bank asked me to provide my login details, but it was a scam.

Portability ๐Ÿ“ฆ: The ability to move data and applications between different devices and systems securely. ๐Ÿ“ฆ๐Ÿ’ป

ย  ย  ย  ย  Example: The cloud technology allows for data portability, enabling users to access their data from any device.

Privacy-focused browser ๐Ÿ”: A web browser that is designed to protect the userโ€™s privacy and security. ๐Ÿ”’๐Ÿ‘€

ย  ย  ย  ย  Example: I use a privacy-focused browser to protect my online privacy and prevent tracking.

Privacy settings ๐Ÿ”’: The controls that allow users to manage how their personal information is shared and used online. ๐Ÿ”๐Ÿ“

ย  ย  ย  ย  Example: I adjusted my privacy settings on social media to control who can see my posts and personal information.

Ransomware ๐Ÿ’ฐ: Malware that encrypts a userโ€™s files and demands payment in exchange for unlocking them. ๐Ÿ’ป๐Ÿ”’

ย  ย  ย  ย  Example: The company’s computer system was infected with ransomware, which encrypted their files and demanded payment to unlock them.

Scalability ๐Ÿ“ˆ: The ability of a system to handle increasing amounts of data or traffic without compromising security. ๐Ÿš€๐Ÿ“ˆ

ย  ย  ย  ย  Example: The company’s scalable cloud infrastructure allows them to handle increasing amounts of traffic without compromising security.

Security ๐Ÿ”’: The measures taken to protect computer systems and networks from unauthorized access, theft, or damage. ๐Ÿ”’๐Ÿšจ

ย  ย  ย  ย  Example: The company’s security measures include firewalls, antivirus software, and regular data backups to protect against cyber attacks and data breaches.

Social engineering ๐Ÿง™โ€โ™‚๏ธ: A way of manipulating people into giving away sensitive information or doing something they wouldnโ€™t normally do. ๐Ÿคซ๐Ÿ‘ฅ

ย  ย  ย  ย  Example: The social engineering tactic used by the scammer involved pretending to be a friend in need to trick me into sending money.

Spoofing ๐ŸŽญ: Pretending to be someone else online to deceive others. ๐Ÿ‘ค๐ŸŽญ

ย  ย  ย  ย  Example: The email pretending to be from a reputable company was a spoofing attempt, attempting to trick me into providing personal information.

Terms of service ๐Ÿ“„: The legal agreement between a user and a service provider that outlines the terms and conditions of using the service. ๐Ÿ“๐Ÿค

ย  ย  ย  ย  Example: The terms of service for the online shopping platform include rules for payments, shipping, and returns.

Third party ๐Ÿ‘ฅ: A person or organization that is not directly involved in a transaction or agreement. ๐Ÿค๐Ÿ‘ฅ

ย  ย  ย  ย  Example: The company’s customer data was leaked to a third party, who was not authorized to access it.

Tracking ๐Ÿ‘€: The practice of monitoring a userโ€™s online activity. ๐Ÿ‘ฅ๐Ÿ‘€

ย  ย  ย  ย  Example: The website uses tracking cookies to monitor my online activity and show me personalized ads.

Two-factor authentication ๐Ÿ”’: A security measure that requires two forms of identification to access a computer system or network. ๐Ÿ”‘๐Ÿ”’

ย  ย  ย  ย  Example: The company’s two-factor authentication process includes a password and a verification code sent to my phone to ensure secure access.

Usability ๐Ÿค–: The ease with which a computer system or network can be used securely and efficiently by its intended users. ๐Ÿ“ˆ๐Ÿค–

ย  ย  ย  ย  Example: The company’s user-friendly and secure software ensures high usability and productivity.

Virtual private network (VPN) ๐ŸŒ: A tool that creates a secure, encrypted connection between a userโ€™s computer and a private network, allowing the user to access the internet securely and privately. ๐Ÿ”’๐Ÿ’ป

ย  ย  ย  ย  Example: I use a VPN to access my company’s private network securely and protect my online privacy.

WiFi packet sniffing ๐Ÿ“ก: The practice of intercepting and analyzing data packets sent over a wireless network. ๐Ÿ“ถ๐Ÿ”Ž

ย  ย  ย  ย  Example: The hacker used WiFi packet sniffing to intercept and steal sensitive information sent over the company’s wireless network.