Glossary

Internet, WiFi and Cyber Security Terms

We are committed to providing our clients with a comprehensive and valuable resource to help clarify common expressions in the field of computers. Our goal is to help our users gain expertise and confidence in using everyday terms and, ultimately to empower them to troubleshoot and resolve issues on their own. We hope that this list will be a useful tool for you. Knowledge is power!

5G
The fifth generation of mobile phone technology
Access point
A device that connects wireless devices to a wired network.
Ad tracking
The practice of collecting data about a user’s online activity in order to deliver targeted advertisements.
Adware
Software that displays advertisements on a computer or mobile device.
Algorithm
A set of rules or instructions that are followed by a computer to solve a problem or perform a task.
Antivirus
A software application that protects a computer from malware.
API (Application Programming Interface)
A set of rules and protocols that allow different software systems to communicate with each other.
Bandwidth
The amount of data that can be transmitted over a connection in a given period of time.
Biometric authentication
A form of authentication that uses physical or behavioral characteristics (such as a fingerprint or facial recognition) to verify a user’s identity.
Bridge
A device that connects two or more networks and forwards data between them.
Broadband
A high-speed internet connection that allows you to access the internet at speeds much faster than a traditional dial-up connection.
Brute-force attack
A type of cyber attack that involves trying all possible combinations of characters in order to guess a password.
BT (British Telecom)
A major telecommunications company in the UK that provides a range of services including broadband internet
Cable
A type of broadband internet connection that uses a coaxial cable to transmit data.
Cable
A type of broadband internet connection that uses coaxial cables to transmit data.
CAP (Connected Allocations Policy)
A policy in the UK that sets out the criteria for awarding state aid to support broadband infrastructure projects in areas where the market has failed to provide broadband services.
Certificate authority (CA)
An organization that issues digital certificates and verifies the identity of the parties involved in a digital transaction.
Cloud computing
A model of computing in which users can access and use shared computing resources over the internet
Cloud storage
A service that allows users to store and access data over the internet
CMS (Content Management System)
A software application that allows users to create and manage the content of a website without requiring technical knowledge of HTML or other programming languages.
Cookie
A small piece of data that is stored on a user’s computer by a website and is used to track the user’s activity on the site.
Cryptojacking
The practice of using someone’s computer or mobile device to mine cryptocurrency without their knowledge or consent.
CSS (Cascading Style Sheets)
A stylesheet language used to describe the look and formatting of a document written in HTML.
Cybersecurity
The practice of protecting computer systems and networks from cyber attacks.
Data allowance
The amount of data you are allowed to use each month as part of your internet service plan.
Data rollover
A feature offered by some mobile phone companies that allows users to carry over any unused data from one month to the next.
Denial of service (DoS) attack
A type of cyber attack that involves overwhelming a computer system or network with traffic in order to make it unavailable to users.
Digital certificate
A digital document that uses a digital signature to bind a public key to the identity of the person
Digital signature
A digital equivalent of a handwritten signature that is used to verify the authenticity and integrity of a digital document.
Distributed denial of service (DDoS) attack
A type of cyber attack that involves using a network of compromised computers (called a botnet) to launch a coordinated DoS attack against a target.
DNS (Domain Name System)
A system that translates human-readable website names (such as www.example.com) into the numerical IP addresses that computers use to communicate with each other.
Domain name
A unique name that identifies a website and is used to access the site’s content.
Download speed
The speed at which data is transferred from the internet to your device.
DSL (Digital Subscriber Line)
A type of broadband internet connection that uses the existing telephone network.
Email client
A software application used to send and receive email.
Encryption key
A piece of information that is used to encrypt and decrypt data.
Encryption
The process of encoding data in such a way that it can only be accessed by someone with the correct decryption key.
Fiber
A type of broadband internet connection that uses fiber-optic cables to transmit data.
Fibre-optic
A type of broadband internet connection that uses fibre-optic cables to transmit data at very high speeds.
Firewall
A security system that controls incoming and outgoing network traffic based on predetermined security rules.
FTP (File Transfer Protocol)
A standard protocol for transferring files over the internet.
FUP (Fair Use Policy)
A policy implemented by some internet service providers that sets limits on the amount of data that can be used in a given period
Gateway
A device that connects a local network to a wider network (such as the internet) and acts as an intermediary for data passing between them.
GDPR (General Data Protection Regulation)
A regulation that sets out the rules for the collection and processing of personal data of individuals in the European Union (EU).
Hash function
A mathematical function that converts an input of any size into a fixed-size output (called a hash value or hash code) that has the property of being unique to the input.
Home phone
A telephone service that allows users to make and receive calls at their home.
HTML (Hypertext Markup Language)
A markup language used to structure and format content on the web.
HTTP (Hypertext Transfer Protocol)
The protocol used to transmit data over the internet.
HTTPS (Hypertext Transfer Protocol Secure)
A version of the HTTP protocol that adds an extra layer of security by encrypting data transmitted between a website and a user’s browser.
Hub
A device that connects multiple devices to a network and broadcasts data to all connected devices.
IaaS (Infrastructure as a Service)
A type of cloud computing in which users can rent computing infrastructure (such as servers and storage) on a pay-as-you-go basis.
IMAP (Internet Mail Access Protocol)
A protocol for accessing email stored on a server.
IMAP (Internet Message Access Protocol)
A protocol used to access email stored on a server.
Index
A database of webpages that is maintained by a search engine and used to generate search results.
Intrusion detection system (IDS)
A security system that monitors a network for unauthorized access or attacks and generates alerts when such activity is detected.
Intrusion prevention system (IPS)
A security system that monitors a network for unauthorized access or attacks and takes action to prevent them.
IP address
A numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.
ISP (Internet Service Provider)
A company that provides internet access to customers.
JavaScript
A programming language used to add interactivity to websites.
Key pair
A set of a public key and a private key that are used together for encryption and decryption.
LAN (Local Area Network)
A computer network that connects devices in a small geographical area (such as a home or office).
Landline
A telephone line that is connected to a physical wire
Latency
The delay between the time a request is made and the time the response is received. In the context of the internet
Malware
Short for “malicious software
Man-in-the-middle (MITM) attack
A type of cyber attack in which the attacker intercepts and modifies the communication between two parties in order to gain unauthorized access or steal sensitive information.
MMS (Multimedia Messaging Service)
A service that allows users to send and receive messages that include multimedia content such as photos and videos.
Mobile broadband
A type of internet connection that uses a mobile network (such as 4G or 5G) to provide internet access.
Mobile hotspot
A device that allows users to share their mobile internet connection with other devices over a Wi-Fi network.
Mobile phone
A portable device that allows users to make and receive calls and send and receive text messages using wireless technology.
Mobile roaming
The ability to use a mobile phone while travelling outside of the home country and still be connected to the local network.
Modem
A device that connects your device to the internet. A modem is typically required for most types of broadband internet connections.
NAS (Network Attached Storage)
A device that connects to a network and provides storage that can be accessed by multiple devices.
Network coverage
The availability of a mobile or broadband network in a particular area.
PaaS (Platform as a Service)
A type of cloud computing in which users can develop
Password manager
A software application or service that stores and manages passwords for multiple online accounts.
Patch
A piece of software that is used to fix a vulnerability or bug in a computer system or application.
Pay-as-you-go
A type of mobile phone plan where users pay for their usage in advance
Phishing filter
A software application or service that automatically identifies and blocks phishing emails.
Phishing
A type of cybercrime in which attackers attempt to obtain sensitive information such as login credentials or financial information by pretending to be a trustworthy entity.
Phone unlocking
The process of removing the network lock on a mobile phone
PII (Personally Identifiable Information)
Information that can be used to identify an individual
Plusnet
A telecommunications company in the UK that provides broadband internet and phone services.
POP (Post Office Protocol)
A protocol for retrieving email from a server.
POP3 (Post Office Protocol version 3)
A protocol used to retrieve email from a server.
Privacy policy
A statement that outlines a company’s practices regarding the collection
Private key
A type of encryption key that is kept secret and is used to decrypt messages that have been encrypted with the corresponding public key.
Public key
A type of encryption key that is made available to anyone who wants to send an encrypted message.
Ranking
The order in which search results are presented to the user
Ransomware
A type of malware that encrypts a victim’s files and demands a ransom from the victim to restore access to the files.
RDP (Remote Desktop Protocol)
A protocol that allows users to remotely access and control a computer over a network.
Repeater
A device that amplifies and forwards signals in a network.
Roaming charges
Additional fees that may be applied when using a mobile phone while travelling abroad.
Root certificate
A digital certificate that is issued by a trusted certificate authority (CA) and is used to sign and verify other digital certificates.
Router
A device that connects multiple computers or other devices to a network and forwards data between them.
Router
A device that connects to the internet and allows multiple devices in a home or office to share the connection.
SaaS (Software as a Service)
A model of software delivery in which users can access and use software over the internet
Salting
The practice of adding random data to a password before hashing it
SAML (Security Assertion Markup Language)
An open standard that allows secure exchange of authentication and authorization data between systems.
Satellite
A type of broadband internet connection that uses a satellite to transmit data.
Satellite
A type of internet connection that uses satellites to transmit data.
Search engine
A software application that allows users to search for information on the internet.
Search query
The words or phrases that a user enters into a search engine to find information on the internet.
Search result
The list of webpages that are returned by a search engine in response to a search query.
SIM (Subscriber Identity Module)
A small card that is inserted into a mobile phone and stores the phone’s International Mobile Subscriber Identity (IMSI)
SIM-only
A type of mobile phone plan that does not include a new phone
Single sign-on
A system that allows users to use a single set of login credentials to access multiple applications or services.
Sky
A telecommunications and media company in the UK that provides broadband internet
Smartphone
A mobile phone that is capable of advanced functions such as accessing the internet
SMTP (Simple Mail Transfer Protocol)
A protocol for sending email over the internet.
Spam filter
A software application or service that automatically identifies and removes spam emails from a user’s inbox.
Spam
Unsolicited emails
Spear phishing
A type of phishing attack that is targeted at a specific individual or organization.
Spyware
Software that tracks a user’s online activity and collects personal information without the user’s knowledge or consent.
SSH (Secure Shell)
A network protocol for securely accessing and managing networked devices over an unsecured network.
SSL (Secure Sockets Layer)
A security protocol that provides a secure connection between a web server and a web browser.
SSL certificate
A digital certificate that is used to establish an SSL/TLS connection and secure data transmitted between a web server and a web browser.
Streaming
The process of delivering audio
Supply chain attack
A type of cyber attack in which the attacker targets a company’s supply chain in order to gain access to the company’s network.
Switch
A device that connects multiple devices to a network and forwards data between them based on the destination device’s MAC address.
Tablet
A portable device that has a touchscreen display and is larger than a smartphone
TalkTalk
A telecommunications company in the UK that provides broadband internet
Telnet
A network protocol that allows users to connect to and control remote devices over a network.
Throttling
The practice of slowing down the speed of internet access for users who have exceeded their usage limits or who are using certain types of traffic
TLS (Transport Layer Security)
A security protocol that provides a secure connection between two devices over a network.
TOR (The Onion Router)
A free
Trojan
A type of malware that disguises itself as legitimate software in order to gain access to a computer.
Two-factor authentication
An additional layer of security that requires users to provide two forms of identification when logging in to an account
Unlimited data
A type of mobile phone plan or broadband package that does not have a set data limit
Upload speed
The speed at which data is transferred from your device to the internet.
URL (Uniform Resource Locator)
A web address that specifies the location of a resource on the internet.
Usage limits
The maximum amount of data that can be used within a given period as part of an internet service plan.
Virgin Media
A telecommunications company in the UK that provides broadband internet
Virus
A type of malware that replicates itself and spreads to other computers.
VNC (Virtual Network Computing)
A platform-independent protocol that allows users to remotely access and control a computer over a network.
VPN (Virtual Private Network)
A technology that allows users to securely connect to a private network over the internet.
Vulnerability
A weakness or flaw in a computer system or network that can be exploited by cyber attackers.
WAN (Wide Area Network)
A computer network that connects devices over a large geographical area (such as a city or country).
Watering hole attack
A type of cyber attack in which the attacker targets a specific website or group of websites that are likely to be visited by the intended victims.
Web beacon
A small
Web browser
A software application that allows users to access and view websites.
Web hosting
A service that stores and maintains the files that make up a website
Whaling
A type of spear phishing attack that is targeted at high-level executives or other individuals with access to sensitive information.
Wi-Fi
A wireless networking technology that allows devices to connect to a network using radio waves.
WLAN (Wireless Local Area Network)
A LAN that uses wireless technology to connect devices.
Worm
A type of malware that replicates itself and spreads to other computers without the need for a host program.
WWAN (Wireless Wide Area Network)
A WAN that uses wireless technology to connect devices.
Zero-day vulnerability
A previously unknown vulnerability that has not yet been patched by the software vendor.