Online privacy and cybersecurity glossary
Comprehensive explanations of key privacy, VPN, and online protection concepts
Dictionary
A
B
C
- Campus area network
- Cellular network
- Chipset
- Ciphertext
- Class A IP address
- Client-server network
- Cloud database
- Cloud networking
- Cloud security posture management (CSPM)
- Cloud VPN
- Code generator
- Communication protocol
- Content delivery network (CDN)
- Content Security Policy (CSP)
- Credentials
- Cybersecurity framework
D
- Dark Web
- Data access
- Data acquisition
- Data aggregation
- Data analytics
- Data at rest
- Data backup
- Data bank
- Data breach
- Data bus
- Data center design
- Data cloud
- Data collection
- Data conversion
- Data definition language (DDL)
- Data dictionary
- Data driven
- Data entry
- Data Execution Prevention (DEP)
- Data exfiltration
- Data fabric
- Data governance framework
- Data integrity
- Data intelligence
- Data lake
- Data leakage
- Data link layer
- Data loss prevention (DLP)
- Data marketplace
- Data mart
- Data masking
- Data migration
- Data mining
- Data preprocessing
- Data processor
- Data profiling
- Data redundancy
- Data retrieval
- Data scraping
- Data server
- Data source
- Data sovereignty
- Data transfer
- Data transmission
- Data validation
- Data warehouse
- Database management system (DBMS)
- Database-as-a-Service
- Datafication
- Datagram
- Decryption
- Dedicated IP
- Differential privacy
- Digital certificate
- Digital data
- Digital footprint
- Digital identity
- Digital trust
- Digital twin
- Digitalization
- Direct memory access (DMA)
- Discretionary access control (DAC)
- DNS
- DNS A record
- DNS attack
- DNS cache
- DNS filtering
- DNS hosting
- DNS over HTTPS (DoH)
- DNS port
- DNS propagation
- DNS proxy
- DNS query
- DNS server
- DNS sinkhole
- DNS TTL
- DNS zone
- DNSSEC (DNS Security Extensions)
- Dynamic DNS (DDNS)
- Dynamic IP
- Dynamic website
E
F
G
H
I
- Identity and access management (IAM)
- Industrial Internet of Things (IIoT)
- Information security management system (ISMS)
- Information security policy
- Infrastructure security
- Internet bot
- Internet of Medical Things (IoMT)
- Internet security
- Internet troll
- IP camera
- IP network
- IP reputation
- IP spoofing
- ipconfig
- IPsec
- IPv4
- IT security
J
K
L
M
N
- Network access control (NAC)
- Network adapter
- Network administrator
- Network automation
- Network bridge
- Network congestion
- Network drive
- Network forensics
- Network hub
- Network infrastructure
- Network interface card
- Network layer
- Network management system
- Network map
- Network operating system
- Network operations center (NOC)
- Network optimization
- Network port
- Network protocols
- Network topology
- Network virtualization
- Next-generation firewall
O
P
- Password policy
- Password protection
- Password spraying
- Password vault
- Passwordless authentication
- Perimeter security
- Peripheral device
- Personal area network (PAN)
- Personal VPN
- PGP encryption
- Pipeline
- Playfair cipher
- Post-quantum cryptography
- Privacy policy
- Private cloud storage
- Private IP address
- Public IP
- Public key encryption
- Public key infrastructure (PKI)
Q
R
S
- Script kiddie
- Scripting language
- Secure Boot
- Secure coding
- Secure enclave
- Secure erase
- Secure Shell (SSH)
- Security assessment
- Security audit
- Security automation
- Security certificate
- Security monitoring
- Security operations center (SOC)
- Security policy
- Security software
- Security token
- Session hijacking
- Sextortion
- Software-defined networking (SDN)
- Spanning Tree Protocol (STP)
- SSL encryption
- SSL VPN
- StartTLS
- Stateful firewall
- Static data
- Static IP
- Storage management
- Stream cipher
- Substitution cipher
- Supply chain security
- Synthetic data