Glossary

Masonry Grid with Terminologies
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • K
  • L
  • M
  • N
  • O
  • P
  • Q
  • R
  • S
  • T
  • U
  • V
  • W
  • A

    Advanced Persistent Threat (APT)

    An advanced persistent threat is a threat actor who goes unnoticed, typically a nation state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period.

    Algorithm

    An algorithm is a procedure or formula for solving a problem, based on conducting a sequence of specified actions.

    AMA

    Ask me anything.

    Anti-virus software

    Anti-virus software, also known as anti-malware, is a computer program used to prevent, detect, and remove malware.

    Application Programming Interface (API)

    An application programming interface is a connection between computers or between computer programs. It is a type of software interface, offering a service to other pieces of software.

    Attack Surface

    The attack surface of a software environment refers to all the different points where an unauthorized user can enter data to or extract data from an environment. Keeping the attack surface as small as possible is a basic security measure.

    Augmented Reality (AR)

    Augmented reality is an interactive experience of a real-world environment where the objects that reside in the real world are enhanced by computer-generated perceptual information, sometimes across multiple sensory modalities, including visual (sight), auditory (hearing), haptic (touch/motion), somatosensory (relating to sensation, like pressure, pain, temperature) and olfactory (smell).

    Authentication

    Authentication is the process of verifying identity.

    Authenticator

    A two-step verification service using Time-based One-time Password Algorithm and HMAC-based One-time Password Algorithm for authenticating users of software applications. (HMAC refers to Hash-based message authentication code.)

    Availability

    Availability (in the context of the CIA Triad) refers to the ability to access information at any time from anywhere when a user is permitted to do so.

    Avatar

    An electronic image or small picture that represents a computer user in a game, on the internet.

    B

    Biometrics

    Biometrics are body measurements and calculations related to human characteristics. Biometric authentication is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.

    Bitcoin

    A digital currency created for use in peer-to-peer online transactions. It is known as a cryptocurrency.

    Blockchain

    Blockchain is the ability to trade an asset directly to another person without a middleman. It is a network of computers that have the same history that validate amongst each other a transaction. Blockchain uses cryptography to encrypt or lock data and secure the transaction on a ledger or list of accounting.

    Botnets

    Botnets are made up of compromised devices, which may be rented out to other potential attackers. Often the botnet is made available to “attack-for-hire” services, which allow unskilled users to launch DDoS attacks.

    Breach

    A data breach is a security violation, in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so.

    Brute Force Attack

    A brute force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found.

    Bug

    A bug is an error, flaw or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways. The process of finding and fixing bugs is termed "debugging" and often uses formal techniques or tools to pinpoint bugs.

    BYOD (Bring Your Own Device)

    BYOD is a policy allowing employees or students to bring personally-owned devices (laptops, tablets, smartphones, etc.) to their workplace or educational institution and to use those devices to access privileged company or school information and applications.

    C

    Catfishing

    Catfishing is a deceptive activity where a person creates a fictional persona or fake identity on a social networking service, usually targeting a specific victim. The practice may be used for financial gain, to compromise a victim in some way, as a way to intentionally upset a victim, or for wish fulfillment.

    Child Pornography

    Child pornography is a form of child sexual exploitation. Federal law defines child pornography as any visual depiction of sexually explicit conduct involving a minor (persons less than 18 years old). Images of child pornography are also referred to as child sexual abuse images. Federal law prohibits the production, distribution, importation, reception, or possession of any image of child pornography. A violation of federal child pornography laws is a crime.

    Children’s Online Privacy Protection Act (COPPA)

    The Children's Online Privacy Protection Act is a United States federal law and disclaimer. The act applies to the online collection of personal information by persons or entities under U.S. jurisdiction about children under 13 years of age including children outside the U.S., if the company is U.S.-based. It details what a website operator must include in a privacy policy, when and how to seek verifiable consent from a parent or guardian, and what responsibilities an operator has to protect children's privacy and safety online including restrictions on the marketing of those under 13. Although children under 13 can legally give out personal information with their parents' permission, many websites, particularly social media sites, but also other sites that collect most personal info, do not allow children under 13 from using their services.

    CIA Triad

    Confidentiality, integrity and availability, also known as the CIA triad, is a model designed to guide policies for information security within an organization.

    Coding

    Coding is the process of creating instructions for computers using programming languages. Computer code is used to program the websites, apps, and other technologies.

    Computer Misuse Act

    The Computer Misuse Act protects personal data held by organizations from unauthorized access and modification). Unauthorized access to computer material. This refers to entering a computer system without permission (hacking) Unauthorized access to computer materials with intent to commit a further crime.

    Confidentiality

    Confidentiality (in the context of the CIA Triad) refers to protecting data from unauthorized access and dissemination.

    Cookie

    When you visit a website, it might place a file called a cookie on your browser. Websites use cookies to customize your browsing experience. When a website you visit places a cookie on your browser, that’s a first-party cookie. The websites you visit often allow other companies to place cookies as well — for example, to deliver ads targeted to you. These are third-party cookies.

    CRPT

    CRPT is an Ethereum token that powers Crypterium, a wallet that aims to combine traditional financial services and cryptocurrency.

    Credential Stuffing

    Credential stuffing is the automated injection of stolen username and password pairs (“credentials”) into website login forms, in order to fraudulently gain access to user accounts.

    Cross-Site Scripting (XSS) attack

    Cross-Site Scripting is a type of security vulnerability that can be found in some web applications. XSS attacks allow attackers to inject scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls.

    Cryptocurrency

    A cryptocurrency is a tradable digital asset or digital form of money, built on blockchain technology that only exists online.

    Cryptography

    Cryptography, or cryptology, is the practice and study of techniques for secure communication in the presence of threat actor behavior.

    Crypto Wallet

    Crypto wallets store your public and private keys, keeping your cryptocurrency safe and accessible. They also allows you to send, receive, and spend cryptocurrencies.

    Cyberbullying

    Cyberbullying is when someone bullies or harasses others on the internet and other digital spaces, particularly on social media sites.

    Cybercrime

    Criminal activities carried out by means of computers or the internet.

    Cybercriminal

    A person who engages in criminal activity by means of computers or the internet.

    Cyber Harassment of a Child

    Harassment of a child through communication that occurs online.

    Cyber Hygiene

    Cyber hygiene refers to the practices and steps that users of computers and other devices take to maintain system health and improve online security. These practices are often part of a routine to ensure the safety of identity and other details that could be stolen or corrupted. Much like physical hygiene, cyber hygiene is regularly conducted to avoid threats.

    Cyber security

    Cyber security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

    Cyberstalking

    Electronic harassment or intimidation that involves stalking, such as tracking someone’s location or monitoring their online behavior without permission.

    D

    Digital Disinhibition/Online Disinhibition

    Digital Disinhibition/Online Disinhibition is the lack of restraint one feels when communicating online in comparison to communicating in-person. People feel safer saying things online which they would not say in real life because they have the ability to remain anonymous behind the computer screen.

    Discord

    Discord is a VoIP, instant messaging and digital distribution platform. Users communicate with voice calls, video calls, text messaging, media and files in private chats or as part of communities called "servers".

    Deepfake

    Deepfakes are synthetic media in which a person in an existing image or video is replaced with someone else's likeness. Deepfakes are videos, images or audio recordings that have been manipulated by AI technology. In a deepfake, an individual can be presented as saying or doing something that didn't actually happen.

    Denial-of-Service Attack (DoS)

    A denial-of-service (DoS) attack is a malicious attempt to overwhelm an online service and render it unusable.

    Distributed Denial-of-Service Attack (DDoS)

    A Distributed Denial-of-Service (DDoS) attack occurs when multiple machines are operating together to attack one target. DDoS attackers often leverage the use of a botnet—a group of hijacked internet-connected devices to carry out large scale attacks. Attackers take advantage of security vulnerabilities or device weaknesses to control numerous devices using command and control software.

    Double Extortion

    Double Extortion is an attack that occurs when a threat actor gains access to a system and finds sensitive, high-value data that is stolen and encrypted. If the ransom is not paid, the threat actor will sell the stolen data online or post to a public forum.

    Doxxing

    Doxxing is the act of releasing or broadcasting someone’s personal, identifiable information with the intention of harming them, encouraging others to harm them, or another malicious intent.

    E

    Encryption

    In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext.

    Entertainment Software Rating Board

    The Entertainment Software Rating Board is responsible for assigning age and content ratings to video games and apps, enforcing marketing guidelines adopted by the video game industry, and operating ESRB Privacy Certified, an FTC-sanctioned COPPA Safe Harbor Privacy seal certification program.

    ESports

    Esports, short for electronic sports, is a form of competition using video games. Esports often takes the form of organized, multiplayer video game competitions, particularly between professional players, individually or as teams.

    Ethereum

    Ethereum is a decentralized, open-source blockchain with smart contract functionality. Ether is the native cryptocurrency of the platform. Amongst cryptocurrencies, Ether is second only to Bitcoin in market capitalization.

    Exploitation

    Exploitation is the act of selfishly taking advantage of someone or a group of people in order to profit from them or otherwise benefit oneself.

    F

    Facebook

    A social media site for connecting with individuals and groups. CEO Mark Zuckerberg founded the company in 2004. Facebook is now called Meta. Meta owns Facebook, Instagram, and WhatsApp.

    Finsta

    A fake Instagram account.

    Firewall

    A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet.

    Flippening

    A reference to the possible event of Ethereum becoming more valuable than Bitcoin, in terms of market cap.

    Frenemy

    "Frenemy" is a combination of "friend" and "enemy" that refers to a person with whom one is friendly, despite a fundamental dislike or rivalry.

    Fungible (Token)

    Fungible refers to non-unique, divisible, and interchangeable. For example, if you trade a $1 USD bill for another, you will get the same dollar bill back. Cryptocurrencies are another example of fungible tokens because each coin has the same value as any other coin of the same type at any given moment.

    G

    General Data Protection Regulation (GDPR)

    The General Data Protection Regulation is a regulation in European Union law on data protection and privacy in the European Union and the European Economic Area.

    Grooming

    Grooming is befriending and establishing an emotional connection with a child, and sometimes the family, to lower the child's inhibitions with the objective of sexual abuse and/or exploitation.

    H

    Hacker

    A hacker is a person who uses computer programming or technical skills to overcome a challenge or problem that deals with computer networking and information security.

    Hacking

    The gaining of unauthorized access to data in a system or computer.

    Honey Pot

    A honey pot is used to entice or attract attackers by setting up a dummy machine with useless data. It’s used to prevent an attacker from getting into a real network. It can be easily monitored by a security team and record the attacker’s behavior.

    Honey Trap

    A honey trap is a practice involving the use of romantic or sexual relationships for interpersonal, political, or financial gain. The victim shares information to another based on their relationship not realizing it’s a scheme.

    Human Trafficking

    Human trafficking involves the use of force, fraud, or coercion to obtain some type of labor or commercial sex act. Victims can be any age, race, gender, or nationality. Traffickers use violence, manipulation, or false promises of well-paying jobs or romantic relationships to lure victims into trafficking situations.

    Hypertext Transfer Protocol (HTTP)

    Hypertext Transfer Protocol (HTTP) is an application-layer protocol for transmitting hypermedia documents, such as HTML. It was designed for communication between web browsers and web servers, but it can also be used for other purposes. HTTP uses Port 80.

    Hypertext Transfer Protocol Secure (HTTPS)

    Hypertext Transfer Protocol Secure (HTTPS) is the secure version of HTTP, which is used to send data between a web browser and a website. HTTPS is encrypted in order to increase security of data transfer. This is important when users transmit sensitive data, such as by logging into a bank account, email service, or health insurance provider. HTTPS uses Port 443.

    I

    Identity Theft

    Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.

    Impersonation

    The act of pretending to be another person for the purpose of fraud.

    Imposter

    An imposter usually seeks some kind of financial gain when he or she assumes another person's identity, but there can be other motivations, like simply the thrill of doing it.

    Insider Threat

    An insider threat is a malicious threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization's security practices, data and computer systems.

    Integrity

    Integrity (in the context of the CIA Triad) refers to ensuring that data is not changed and maintains accuracy and trustworthiness. The data has not been altered.

    Internet of Things (IoT)

    Internet of things describes physical objects that are embedded with sensors, processing ability, software, and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks.

    Internet Service Provider (ISP)

    An Internet Service Provider is a company that provides services for accessing, using, or participating in the internet.

    Instagram

    Instagram is a photo and video sharing social media platform owned by Meta, formerly Facebook.

    IRL

    In real life

    K

    Keylogging

    Keylogging, (also known as keyboard capturing/Keystroke logging), is the action of recording the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program.

    KYC

    Know your customer or know your client guidelines in financial services require that professionals make an effort to verify the identity, suitability, and risks involved with maintaining a business relationship.

    L

    LAN

    A local area network is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building.

    M

    Malware

    Malware (short for “malicious software”) is a file or code delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants.

    Metaquette

    “Metaquette” is online etiquette that occurs in the Metaverse, a virtual reality environment. It refers to the proper behavior that should be exhibited in virtual spaces between people and/or their avatars.

    Mint/Minting

    To mint or minting, referring to an NFT (non-fungible token) means to create something on the blockchain.

    Motion Picture Association - Movie Rating Systems

    The Motion Picture Association content rating system is an organization designated to classify films based on their suitability for audiences due to their treatment of issues such as sex, violence, or substance abuse; their use of profanity; or other matters typically deemed unsuitable for children or adolescents.

    Multi-Factor Authentication (MFA)

    Multi-Factor Authentication, also referred to as MFA, is an authentication method that requires the user to provide two or more verification factors to gain access to a resource such as an application, online account, or a VPN.

    N

    Netiquette

    The proper way of communicating on the internet.

    Non-Fungible Token (NFT)

    A Non-Fungible Token (NFT) is a unique unit of data employing technology that allows digital content—from videos to songs to images—to become logged and authenticated on cryptocurrency blockchains, primarily Ethereum.

    O

    OLF

    On-line Friends

    Online Dating

    Online dating enables people to find and introduce themselves to potential connections over the internet, usually with the goal of developing personal, romantic, or intimate sexual relationships.

    Online Grooming (See Grooming)

    Online Grooming is befriending and establishing an emotional connection with a child, and sometimes the family, to lower the child's inhibitions with the objective of sexual abuse and/or exploitation.

    P

    P2E

    Play-to-earn refers to crypto games. This is because these games use the blockchain technology of cryptocurrencies to allow people to receive payments from their gameplay.

    Password

    A password, sometimes called a passcode, is secret data, typically a string of characters, including uppercase and lowercase letters, numbers, and special key characters, used to confirm a user's identity.

    Password Manager

    A password manager is a computer application that allows users to store, generate, and manage their passwords for local applications and online services.

    Pedophile

    A pedophile is a person who has a sustained sexual desire toward children.

    Pedophilia

    A persistent desire in an adult to have sex with a child.

    Personally Identifiable Information (PII)

    Personally Identifiable Information (PII) refers to information that can be used to distinguish or trace an individual’s identity, either alone or when combined with other personal or identifying information that is linked or linkable to a specific individual.

    PFP

    A PFP is a Profile Picture. It typically consists of an image built around a community such that people can recognize you and your interests.

    Phishing

    Phishing is a type of social engineering where an attacker sends a fraudulent message designed to trick a human victim into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware.

    POAP

    A POAP (Proof of Attendance Protocol) is a NFT digital token that indicates your attendance to a virtual or live event. It’s like a digital scrapbook.

    Pornography

    Pornography is printed or visual material, such as a video containing the explicit description or display of sexual organs or activity, intended to stimulate erotic rather than aesthetic or emotional and intimate feelings.

    Privacy

    Privacy is about keeping safe the identity of a user.

    Privacy Policy

    A privacy policy is a statement or legal document that discloses some or all of the ways a party gathers, uses, discloses, and manages a customer or client's data.

    Proxy

    In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource.

    Q

    QR Code

    QR stands for "Quick Response." A QR code is a scannable barcode encoded with data. Encoded means converted into a particular form.

    R

    Ransomware

    Ransomware is malware that employs encryption to hold a victim’s information at ransom. A user or organization’s critical data is encrypted so that they cannot access files, databases, or applications. A ransom is then demanded to provide access.

    Revenge Porn

    Revenge porn is the distribution, without consent, of sexually explicit images of someone else without their consent. Often, but not always, a former intimate partner publishes the images online.

    S

    SDLC

    Software Development Life Cycle is a process where software goes through ideation to implementation.

    Security Posture

    Security posture refers to an organization's overall cybersecurity strength and how well it can predict, prevent and respond to ever-changing cyberthreats.

    Sexting

    Sexting is sending, receiving, or forwarding sexually explicit messages, photographs, or videos, primarily between mobile phones, of oneself to others.

    Smart Contract

    Self-executing code deployed on a blockchain. Smart contracts allow transactions to be made without an intermediary figure and without the parties involved having to trust one another.

    Smishing

    Smishing is a form of phishing that uses SMS on a mobile device as the attack platform. The criminal executes the attack with an intent to gather personal information, including social security number and/or credit card numbers.

    SMS

    Short Message Service

    Snapchat

    Snapchat is a multimedia instant messaging app and service. One of the main features of Snapchat is that pictures and messages are available for a short time before they become inaccessible to their recipients.

    Social Engineering

    Social engineering is the art of manipulating people so they give up confidential information.

    Spoofing

    Spoofing is when someone or something pretends to be something else in an attempt to gain a victim's confidence, gain access to a system, steal data, or spread malicious software.

    Sock Puppet

    An online disguise or persona, to inject themselves into the victim’s life to learn even more about them.

    Stalkerware

    Stalkerware refers to tools such as software programs, apps, and devices that enable someone to secretly spy on another person’s private life via their mobile device.

    Surveillance

    Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing.

    T

    Terms & Conditions

    Terms & Conditions are the legal agreements between a service provider and a person who wants to use that service.

    TikTok

    TikTok is a video-focused social networking service.

    Tracking

    (see Cookie)

    Trafficking

    (see Human Trafficking)

    Troll

    A troll is a person who intentionally antagonizes others online by posting inflammatory, irrelevant, or offensive comments or other disruptive content.

    Twitch

    Twitch is an interactive livestreaming service for content including gaming, entertainment, sports, education, and music.

    Twitter

    Twitter is a microblogging and social networking service on which users post and interact with messages known as "tweets".

    Two-Factor Authentication

    (see Multi-Factor Authentication) Also referred to as 2FA.

    U

    Upstander

    A person who is upright in character and behavior. They will advocate for another person who is being harmed, especially in the cases of bullying.

    Upstanding

    Upright in character and behavior.

    User Agreement Policy (UAP)

    A user agreement policy is an agreement made between the owner, administrator or provider of a web or mobile application based service and the user of such a service, that defines the rights and responsibilities of both the parties.

    V

    Validator

    A computer that helps process transactions made on a blockchain.

    Virtual LAN

    A virtual local area network is any broadcast domain that is partitioned and isolated in a computer network.

    Virtual Private Network (VPN)

    A virtual private network provides online privacy and anonymity by creating a private network from a public internet connection or network.

    Virtual Reality (VR)

    Virtual reality, also known as VR, is a simulated experience that can be similar to or completely different from the real world.

    Virus

    A computer virus is a type of computer program that, when executed, copies itself by changing other computer programs and inserting its own code.

    Vishing

    Vishing refers to fraudulent calls or voicemails.

    W

    WAN

    A wide area network is a telecommunications network that extends over a large geographic area.

    WL

    Whitelist, especially for a pre-mint event of a NFT going on sale.