Here’s a glossary of Internet Safety, Cybersecurity, and Online Privacy terms, covering threats, protections, best practices, and related technologies:
🛡️ INTERNET SAFETY & CYBERSECURITY GLOSSARY
A
Antivirus / Anti-Malware – Software designed to detect and remove malicious programs.
Authentication / Identity Verification – Process confirming a user’s identity before access.
Authorization / Access Control – Permission system determining what users can do online.
Adware / Advertising Malware – Software that displays unwanted ads on devices.
Attack Vector / Entry Point – Method or pathway used by attackers to breach a system.
B
Backup / Data Copy – Storing copies of data to prevent loss from cyber attacks.
Bot / Automated Program – Software executing tasks online; can be benign or malicious.
Botnet / Network of Compromised Devices – Group of infected computers controlled remotely.
Brute Force Attack / Password Guessing – Trying many passwords to gain unauthorized access.
Browser Hijacking / Malicious Browser Control – Attack that changes browser settings without consent.
C
Clickjacking / UI Redirection Attack – Trick users into clicking hidden or malicious elements.
Certificate / Digital Certificate – Confirms the identity of websites for secure connections.
Content Filtering / Access Restriction – Blocking harmful or inappropriate web content.
Cryptojacking / Unauthorized Cryptocurrency Mining – Using a device to mine crypto without consent.
Cyberbullying / Online Harassment – Using internet tools to threaten or humiliate others.
D
DDoS / Distributed Denial of Service – Overloading a network or website to make it unavailable.
Data Breach / Unauthorized Access – Exposure of sensitive information to attackers.
Deepfake / AI-Manipulated Media – Synthetic content designed to mislead or impersonate.
Digital Footprint / Online Trace – Record of all activities a person performs online.
DNS Spoofing / Fake Domain Attack – Redirecting traffic to malicious sites by altering DNS.
E
Encryption / Data Protection – Encoding information to prevent unauthorized access.
Email Phishing / Scam Emails – Fraudulent emails attempting to steal credentials or data.
Exfiltration / Data Theft – Unauthorized removal of sensitive information.
Endpoint Security / Device Protection – Measures securing individual devices connected to the internet.
Exploit / Security Vulnerability Use – Software or method used to take advantage of weaknesses.
F
Firewall / Network Barrier – Filters and blocks unauthorized network traffic.
Fraud / Deceptive Online Practices – Attempts to cheat or scam internet users.
Fingerprinting / Device Identification – Tracking devices based on unique configurations.
Forced Entry / Unauthorized Login – Illegally gaining access to accounts or systems.
Fake News / Misinformation – False information spread online to mislead users.
G
Grayware / Unwanted Software – Programs that are not malware but can cause disruptions.
Governance / Internet Safety Policies – Rules and strategies for safe online conduct.
Geotagging / Location Data Exposure – Revealing geographic location via online content.
Guard / Security Agent – Software or human responsible for monitoring online safety.
GDPR / General Data Protection Regulation – European regulation for personal data privacy.
H
Hacking / Unauthorized System Access – Exploiting vulnerabilities to gain access to data.
Hybrid Threat / Combined Attack Type – Cyber attack using multiple methods (e.g., phishing + malware).
HTTPS / Secure Web Protocol – Encrypted communication standard for safe web browsing.
Hoax / Online Scam – False claims intended to deceive internet users.
Human Error / Accidental Data Exposure – Unintentional mistakes causing security risks.
I
Identity Theft / Fraudulent Use of Personal Data – Using someone else’s identity online.
IoT Vulnerability / Weakness in Smart Devices – Security gaps in Internet of Things devices.
Incident Response / Cyber Attack Handling – Process to manage and mitigate security incidents.
IP Spoofing / Falsified IP Address – Sending data from a fake IP to impersonate another device.
Intrusion Detection System / IDS – Monitors network for suspicious or malicious activity.
J
JavaScript Injection / Malicious Script Attack – Injecting harmful scripts into websites.
Jailbreaking / Device Security Bypass – Removing restrictions on devices to install unauthorized apps.
Jump Server / Secure Access Point – Controlled server for managing sensitive network access.
Junk Mail / Spam Emails – Unsolicited and potentially harmful email messages.
JSON Web Token / Secure Session Token – Standard for secure authentication in web apps.
K
Keylogger / Credential-Stealing Software – Records keystrokes to capture passwords or data.
Kerberos / Network Authentication Protocol – Secure method for validating identities in networks.
Kill Chain / Attack Process – Stages an attacker follows to breach systems.
KYC / Know Your Customer – Verification process to ensure user legitimacy online.
Key Management / Encryption Key Security – Safe handling of cryptographic keys.
L
LDAP / Lightweight Directory Access Protocol – Centralized authentication and directory service.
Login Credentials / Username & Password – Combination used for system access.
Logic Bomb / Hidden Malicious Code – Code that triggers harmful actions under specific conditions.
Link Scamming / Malicious URL – Using fake or dangerous links to deceive users.
Lurking / Passive Online Threat Exposure – Monitoring or harvesting information without interaction.
M
Malware / Malicious Software – Programs designed to damage, steal, or disrupt.
Man-in-the-Middle Attack / MITM – Intercepting communications between two parties.
Monitoring / Online Activity Surveillance – Observing digital interactions for security.
Multifactor Authentication / MFA – Using multiple methods to verify user identity.
Misconfiguration / Security Gap – Incorrect setup of systems leading to vulnerabilities.
N
Network Security / Protection of Connected Devices – Safeguarding data and systems on a network.
Nonce / One-Time Random Value – Number used once in authentication to prevent replay attacks.
NFC Security / Contactless Communication Protection – Securing short-range wireless transfers.
Notifications / Alerts for Suspicious Activity – Warnings for potential threats online.
NAT / Network Address Translation Security – Hiding private IPs to prevent exposure.
O
Online Privacy / Personal Data Protection – Controlling what information is shared online.
Obfuscation / Data Hiding Technique – Concealing code or data to prevent tampering.
OAuth / Third-Party Access Control – Secure authorization method for apps.
Open Wi-Fi Risk / Public Network Vulnerability – Security risks when using unsecured networks.
Over-Exposed Data / Sensitive Information Leakage – Personal or corporate data unintentionally accessible.
P
Phishing / Credential Theft Scam – Fraudulent attempts to obtain passwords or sensitive info.
Password Manager / Secure Credential Storage – Tool for storing and generating strong passwords.
Patch / Software Update – Fix for vulnerabilities in programs or systems.
Proxy / Intermediate Server – Routes traffic and can add privacy or filtering.
Penetration Testing / Ethical Hacking – Testing systems for vulnerabilities before attackers exploit them.
Q
Quarantine / Isolated Threats – Separating suspicious files to prevent harm.
QR Code Scam / Malicious QR Codes – Codes linking to dangerous websites.
Quality of Security / Safety Standard – Measure of how secure an internet system is.
Query Logging / Activity Tracking – Recording network or database requests for security.
Quota / Data Access Limit – Restriction to prevent excessive or risky online activity.
R
Ransomware / Data-Encrypting Malware – Locks user files until ransom is paid.
Rootkit / Hidden Malware – Malicious software that hides in system for long-term control.
Remote Wipe / Device Data Deletion – Erasing data on lost or stolen devices.
Router Security / Network Gateway Protection – Measures securing home or office routers.
Risk Assessment / Vulnerability Evaluation – Identifying potential security threats.
S
Spam / Unsolicited Messages – Irrelevant or dangerous emails/messages.
Spyware / Monitoring Software – Software secretly collecting user information.
SSL/TLS / Secure Communication Protocols – Encrypts internet traffic for safety.
Social Engineering / Manipulation Attack – Deceptive tactics to trick users into revealing information.
Security Breach / Unauthorized Access – Compromise of system or data integrity.
T
Two-Factor Authentication / 2FA – Using two verification methods for secure access.
Trojan / Malware Disguised as Legitimate Software – Malicious software pretending to be safe.
Traffic Encryption / Securing Data in Transit – Protecting data as it moves over networks.
Threat Intelligence / Security Data Analysis – Information about potential attacks.
Tokenization / Data Obfuscation – Replacing sensitive info with non-sensitive substitutes.
U
URL Filtering / Malicious Website Blocking – Preventing access to harmful websites.
User Education / Cybersecurity Awareness – Training users to stay safe online.
USB Threat / External Device Risk – Malware introduced via USB drives.
Update Management / Patch Deployment – Ensuring software is current and secure.
Unauthorized Access / Intrusion – Accessing systems without permission.
V
VPN / Virtual Private Network – Secure, encrypted tunnel for online activity.
Virus / Self-Replicating Malware – Malware that spreads across systems.
Vishing / Voice Phishing – Using phone calls to steal information.
Vulnerability / Weakness in System – Flaw that can be exploited by attackers.
Verification / Confirming Identity – Checking legitimacy of users or processes.
W
Wi-Fi Security / Wireless Protection – Measures to protect wireless networks.
Whitelisting / Approved Access List – Allowing only trusted programs or sites.
Worm / Self-Propagating Malware – Malware that spreads automatically across networks.
Webcam Security / Camera Protection – Preventing unauthorized access to cameras.
Watchdog / Security Monitoring Tool – Software or process monitoring systems for attacks.
X
XSS / Cross-Site Scripting – Attack injecting malicious code into websites.
XDR / Extended Detection & Response – Advanced threat detection across multiple platforms.
XML Encryption / Data Protection – Securing XML data in communication.
X.509 / Digital Certificate Standard – Used in HTTPS and secure communications.
XaaS Security / Cloud Service Protection – Safeguarding Anything-as-a-Service platforms.
Y
YouTube Privacy / Video Platform Safety – Measures to protect content and users online.
Yield / Successful Threat Prevention Rate – Measure of security effectiveness.
Yara Rules / Malware Identification – Pattern matching for detecting malware.
Yottabyte Security / Massive Data Protection – Strategies for extremely large data volumes.
Young User Protection / Child Online Safety – Guidelines for protecting minors on the internet.
Z
Zero-Day Exploit / Unpatched Vulnerability – Security flaw unknown to vendor or public.
Zombie Device / Compromised System – Device controlled remotely by attackers.
Zoning / Network Segmentation – Dividing networks to contain threats.
Zip Bomb / Malicious Compressed File – File designed to crash or overload systems.
Zero Trust / Security Model – Never trust any entity by default, always verify.
Published 17th Feb 2026