top of page

Glossary
Access Control – Restricting who can view or use digital resources.
Adware – Unwanted software that shows pop-up ads.
Algorithm – A set of steps computers use to solve tasks.
Antivirus – Software that detects and removes malicious programs.
App Permissions – Settings that control what apps can access (camera, contacts, etc.).
Application Security – Protecting apps from hackers and misuse.
Artificial Intelligence (AI) – Tech that mimics human thinking or decision-making.
Authentication – Proving you are who you say you are (e.g., password, fingerprint).
Authorization – Granting permission to access or use digital information.
Auto-Update – Automatically installing the latest software versions.
Backdoor – A hidden way into a system, often used by hackers.
Backup – A copy of your files saved in case of loss.
Behavioral Tracking – Monitoring actions online to learn about your habits.
Biometrics – Security that uses your body (like face or fingerprint).
Black Hat Hacker – A hacker who breaks into systems for harm.
Blockchain – A secure digital ledger used in cryptocurrencies.
Bot – Automated software that performs tasks, good or bad.
Botnet – A group of hacked devices controlled remotely.
Breach – When personal or sensitive data is accessed without permission.
Browser Hijacking – When a website or ad takes control of your browser.
Cache – Temporary data stored to load websites faster.
Captcha – A test to tell humans and bots apart online.
Clickjacking – Trick clicking something harmful disguised as something harmless.
Cloud Storage – Saving data online instead of on your device.
Cookie – A small file that tracks website visits and preferences.
Credential Stuffing – Using stolen logins to access accounts.
Cross-Site Scripting (XSS) – A website attack that tricks your browser.
Cryptocurrency – Digital money used for online transactions.
Cryptography – Securing information by turning it into unreadable code.
Cyberbullying – Using tech to harass or harm others.
Dark Mode – A visual setting that reduces eye strain.
Dark Patterns – Website tricks that push you to click or buy.
Dark Web – A hidden part of the internet used anonymously.
Data Broker – A company that collects and sells your info.
Data Breach – When your personal info is leaked or stolen.
Data Encryption – Scrambling information so only authorized users can read it.
Data Leak – When private info is exposed, usually by accident.
Deepfake – Fake audio or video made using AI.
Device Fingerprinting – Tracking based on your device’s unique traits.
Digital Footprint – The trail of everything you do online.
Email Spoofing – Faking an email address to look legitimate.
Encryption – Hiding information with code.
End-to-End Encryption – Only you and the person you're messaging can read the message.
Endpoint – Any device connected to the internet (phone, laptop, etc.).
Ethical Hacker – A hacker who helps improve security.
Evil Twin – A fake Wi-Fi hotspot set up to steal data.
Exposed Credentials – Leaked usernames and passwords found online.
Exploit – Taking advantage of a flaw in software or systems.
External Drive – A portable storage device for backups.
Eye Strain – Tiredness from screen use; not security, but still digital wellness.
Fake App – A malicious app pretending to be real.
Family Link – Google tool to manage kids’ online activity.
Firewall – A security barrier between your device and threats.
Firmware – Software built into devices, like routers or printers.
Formjacking – Stealing your info from online forms.
Fraud Alert – A flag on your credit file after suspicious activity.
Free Wi-Fi Risk – Public networks often lack security.
Friend Request Scam – Fake social media accounts to trick or track you.
Full Disk Encryption – Encrypting everything on a device to keep it secure.
Fuzzy Matching – Finding similar passwords or data, even if misspelled.
Geofencing – Setting virtual boundaries using location data.
Geotagging – Adding location info to photos or posts.
Google Authenticator – An app for extra login protection (2FA).
Grayscale Mode – Turns your screen black & white to reduce distraction.
Group Chat Privacy – Making sure group messages don’t leak info.
Hacktivist – A hacker with political or social motives.
Hardware Token – A physical device used in two-factor authentication.
Hashtag Scams – Posts pretending to be helpful but lead to phishing.
Hashing – Turning data into an unreadable fixed code.
HTTPS – Secure version of websites using encryption.
Identity Theft – When someone pretends to be you online.
IMSI Catcher – Fake cell tower that intercepts your phone data.
Incognito Mode – Private browsing that doesn’t save history.
Information Hygiene – Keeping personal data clean and secure.
IoT (Internet of Things) – Smart devices connected to the internet.
Jailbreaking – Removing restrictions on a device, often reducing security.
Juice Jacking – Data theft via public USB charging stations.
JustDeleteMe – A site that helps you delete online accounts.
Junk Mail – Unwanted or spam emails.
JavaScript – Code that makes websites interactive (can be exploited).
Keystroke Logger – Secretly records what you type.
Kid-Friendly Browsers – Browsers with built-in parental controls.
KYC (Know Your Customer) – Verification process used by banks and apps.
Kill Switch – Shuts off devices or VPNs during security risks.
Kernel – Core part of an operating system.
Location Services – Tracks your physical location through apps.
Logic Bomb – Code that triggers malicious action after certain conditions.
Lock Screen – First line of defense on your phone or computer.
Login Attempt Alert – Notification if someone tries to access your account.
Low Battery Scam – Fake warnings that trick users into downloading malware.
Malware – Harmful software like viruses or spyware.
Man-in-the-Middle Attack – Hacker intercepts data between you and a website.
Metadata – Data about your data (e.g., when a photo was taken).
Mobile Security – Tools and habits to keep your phone safe.
Multi-Factor Authentication (MFA) – Using more than one method to log in.
Network Security – Protecting your Wi-Fi and internet connection.
NFC (Near Field Communication) – Wireless tech used for tap-to-pay systems.
Noise Privacy App – Apps that block background conversations or eavesdropping.
Nonce – A unique number used once in authentication.
Notification Scam – Fake push notifications that steal info or money.
Online Grooming – When predators build trust with kids online.
Online Hygiene – Habits that keep your online identity clean.
Open Wi-Fi – Unsecured networks open to anyone.
Oversharing – Sharing too much personal info online.
Operating System Updates – New versions that fix security bugs.
Parental Controls – Settings to manage children’s device use.
Password Manager – Secure app that stores and creates passwords.
Patch – A fix for bugs or security flaws.
Phishing – Scams that trick you into giving personal info.
Privacy Settings – Controls for what others see about you online.
QR Code Scam – Malicious QR codes that trick you.
Quarantine Folder – Where antivirus software stores threats.
Quick Settings – Device controls for things like Wi-Fi and Bluetooth.
Quota Limit – Maximum amount of data or storage allowed.
Quiet Mode – Reduces interruptions and helps focus online.
Ransomware – Locks your files and demands payment.
Reputation Management – Taking care of your online image.
Remote Access – Controlling a device from another location.
Risk Assessment – Evaluating digital threats.
Router Security – Protecting your home internet hub.
Scam – A trick to steal your money or data.
Screen Time – How long you spend on devices.
Secure Browsing – Being careful with how and where you surf online.
Security Patch – A quick fix for software vulnerabilities.
SIM Swap – A phone number hijack to steal info.
Tech Support Scam – Fake calls or messages pretending to help.
Terms of Service – Rules you agree to when using apps.
Threat Actor – The person or group behind a cyberattack.
Trojan Horse – Malware that looks like a safe program.
Two-Factor Authentication (2FA) – Two steps to verify who you are.
VPN (Virtual Private Network) – Hides your activity and location online.
Virus – Code that spreads and damages computers.
Vishing – Phone call phishing.
Voice Assistant Privacy – Making sure devices like Alexa aren’t oversharing.
Vulnerability – A weakness that hackers can exploit.
Watering Hole Attack – Infecting a site that targets commonly visit.
Webcam Hijacking – Taking control of your camera without permission.
Whitelisting – Approving only trusted users or apps.
Wi-Fi Spoofing – Creating fake Wi-Fi to steal data.
Worm – Malware that spreads without needing a file.
Zero-Day – A flaw unknown to developers.
Zombie Device – A device secretly controlled by hackers.
Zoom Bombing – Disrupting online meetings with offensive content.
Zoning Out – Mental fatigue from screen overload.
Zettabyte – One billion terabytes; used to measure huge data volumes.

Need help applying these concepts to your digital life?
Book a 1-on-1 Security Consultation or check out our Professional Digital Scrubs
bottom of page
