Legal document outlining how a company can collect and use your data
any data that can be used to identify an individual, such as their name, address, or social security number
Information literacy is having the ability to find information, evaluate information credibility, and use information effectively.
A computer system able to perform tasks that ordinarily require human intelligence
a video or image of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously or to spread false information.
The Internet of Things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.
The protection of information from people who are not authorized to view it.
Aims at ensuring that information is protected from unauthorized or unintentional alteration.
The assurance that systems and data are accessible by authorized users when and where needed.
Ensures that one cannot deny having sent or received a message.
A flaw or weakness in a system or device.
The potential for loss when an attack happens.
A potential for a cybercriminal to exploit a vulnerability.
The process of identifying a user and granting them access. Authentication is proving that someone is who they say they are.
The process of enforcing policies and user privileges. Once a user is authenticated, they may only be authorized to access specific areas or may only have rights to perform specific tasks.
The process of measuring what is happening within the system. This is the final process of the AAA framework and ensures that there is a log of all actions within the network or system.
Any type of software that is designed to intentionally harm or damage a computer or network.
A type of malware that attaches itself onto a host program, such as a document. It can cause serious damage to files or an entire device.
A software that prevents users from accessing their files or network until a ransom is paid.
Once downloaded onto a user’s computer, the software secretly gathers information about a person or organization and sends it to the attacker.
A cybercrime in which a person is contacted by email, telephone or text message by someone who is posing as a legitimate company.
A network security device that monitors and filters incoming and outgoing network traffic.
A type of authentication that is similar to a password but longer and is usually a sentence or a series of words
(2FA) A type of multifactor authentication that typically combines something the user knows (like a password) with something the user has (like a mobile phone)
(MFA) An extra layer of authentication that requires two or more factors for authentication. Typically, these factors fall into three categories: something you know (password), something you have (such as a phone), or something you are (such as your fingerprint).
A form of authentication that uses an individual’s physical or behavioral characteristics to verify their identity
Tools that store and manage passwords for various accounts, generating strong passwords and auto-filling login credentials.
The information about a particular person that exists on the Internet as a result of their online activity
the use of electronic communication to bully a person
A law that grants the creator of an original work exclusive rights to its use, distribution, and sale
The moral principle that governs a person's behavior.
refers to an external mechanism of control
A specific group of hackers who are motivated by their ideological views.
Have political motivations with the intent to harm, typically resulting in violence.
Sponsored by and funded by a government with the goal of giving their country a competitive advantage on a global scale.
The practice of encrypting information so only authorized people can read it.
A process of converting information into an unreadable form to keep it secure from unauthorized access.
The process of breaking an encryption by trial and error.
When the same key is used to both encrypt and decrypt.
When one key encrypts and a different key decrypts.
A cipher that changes one character or symbol into another.
A cipher that groups bits into blocks of plaintext before applying the encryption.
A cipher that shifts the positions of plaintext character (or groups of characters) according to a regular system.
A small data file that digitally binds a public cryptographic key to an organization.
An algorithm used to change a message into an unreadable string of text for the purpose of verifying the information.
An operating system such as Windows, Mac OS, Android or iOS.
Software that only works on one platform, such as only on Android phones, or only on Mac computers.
Software that works on multiple platforms.
Used to log in to a computer, comprised of a username, password, personalized settings and set permissions.
Has full access and full control to manage other users, set permissions and change computer settings and programs.
Authorization given to user accounts that grants them certain privileges and enables them to access specific folders and files.
The main, controlling account responsible for providing security updates, antivirus software and setting permissions for anyone on the same network.
An agreed upon set of rules and permissions.
Specifying access rights and permissions for each user.
Proving the identity of the user.
Updates that address and fix security vulnerabilities within a program or product.
A type of computer program that can spread by modifying other computer programs and inserting its own code (rules).
A copy or snapshot of the state of your computer.
Backs up everything on your computer.
Backs up only what has changed since the last backup.
Used to navigate the world wide web and view HTML files.
A collection of data and files used to increase the speed of the browser.
Program code, usually written in JavaScript, that is executed on the client's browser.
An intermediary between the user and the Internet that takes requests from the user and returns a response.
Confirms the identity and authenticity of a website.
Processes commands to a computer program in the form of lines of text.
Legally binding guidelines for use and distribution of software.
Software that is available for anyone to access and modify.
Software that is owned by an individual or company.
Refers to the design of the essential parts of an application and how they are connected to each other.
Software installation that is performed on your local computer.
Software installation that is performed on a local area network (LAN).
Software that is installed, hosted and accessed entirely from a remote server or location.
The size, shape, and physical specifications of any physical aspect of a computer system.
Bit means "binary digit". A bit is a single digit in a binary number. A bit can either be 0 or 1.
A byte is 8 bits.
Number system that has 2 digits, 0 and 1. This is how computers represent numbers at the base level.
A semiconductor device used to amplify or switch electronic signals and electrical power, functioning as an on/off switch in computing
The process of converting information or data into a specific format that can be understood or processed by a computer.
A new 128 bit version of the Internet Protocol.
The protocol that defines the payout of an an Internet address.
An agreed upon set of rules that outlines how to communicate or send information.
The original 32 bit IP protocol that was created in the 1980s.
Stands for Uniform Resource Locator. You are locating a resource that exists somewhere on the internet.
Used to translate domain names into IP addresses.
Protocol that standardizes the language for talking to web servers to send and receive web resources. Defines how computers send and receive hypertext information. (HTTPS: The “S” denotes a secure connection using HTTP.)
The unique address that is assigned to each device connected to the internet. It is part of the Internet Protocol.
A computer that stores web pages and makes them available to users on the internet.
The process of sending data between two computers on the internet. The data is sent through routers that determine the route.
Allows for sending MULTIPLE packets between two computers. TCP checks that all packets arrived and can be put back in the proper order. The metadata must include a destination IP address, a from IP address, the message size and the packet order number.
An access point that allows for network management and security configuration.
a system that will operate with no interruption when one or more of its components fail
When data is passed from one network segment to another.
The number of hops it takes for data to get to its final destination.
Advanced Research Projects Agency Network, precursor to the modern internet
UDP is often used in real-time applications where timely delivery of data is more important than the accuracy of delivery. UDP does not number the packets and it does not retransmit packets that are lost.
ASCII is the standard protocol for encoding text information as bits. The ASCII table assigns a unique binary number to every text character.
Unicode is a system that lets computers show and use all kinds of characters from different languages and writing systems around the world.
A kilobyte (kB) is 2^10 bytes (1024 bytes) of binary data.
A megabyte (MB) is 2^20 bytes (1024 kB) of binary data.
A gigabyte (GB) is 2^30 bytes (1024 MB) of binary data.
Images are made up of pixels, which are essentially a grid of values. Each value, or pixel, encodes the color at that position in the image.
The RGB encoding scheme allows us to encode colors as numeric data. It defines the amount of Red, Green, and Blue light in a pixel. Each color channel can have a value between 0 and 255.
A terabyte (TB) is 1024 GB of binary data.
A philosophy of making information and knowledge open and accessible to all people. A network of networks built on open, agreed upon protocols.
A network where devices are connected via physical cables.
A network where devices connect without physical cables, typically using radio waves.
The process of varying a signal to transmit data.
Undersea cables used for transmitting telecommunications signals across oceans.
A computer scientist known as one of the "fathers of the internet."
A widely agreed upon set of rules that standardize communication between machines.
A conceptual framework used to understand and standardize the functions of a telecommunication or computing system without regard to its underlying internal structure and technology.
A distinct level in a networking framework that carries out specific functions.
Computing solutions are solutions to problems that involve the use of a computer system. This can be either a hardware, software, or combination of the two.
A circuit board with ports and sockets used to connect the main devices of a computer.
A special kind of firmware that runs programs strictly to start up your computer.
The core component of a device that accepts and executes instructions.
A fast type of computer memory which temporarily stores all the information your device needs right away.
A fast access storage device used in computers.
A component designed to speed up the creation of images and output them to a display device, like a monitor.
A component with a built in wired network port that allows the computer to connect to a network.
A location where information is sent from one computer to another.
Checks to see which ports on a network are open.
A device or software that blocks unwanted Internet traffic while allowing legitimate traffic.
A device that will be recognized by your computer and install on its own.
A group of files that allows a device to communicate with the computer’s operating system.
A short-range wireless communication technology that uses radio waves to transmit information.
Enables short-range communication between compatible devices.
Storage that is available only while the system is on and disappears when the system is turned off.
Storage that is saved and available even when the system is shut down.
Storage that contains one or more drives that can be accessed over a network.
Network attached storage that is equipped with powerful network adapters.
A wireless LAN that uses radio frequency technology to send and receive data.
A virtual LAN that allows for the setup of separate networks by configuring a network device.
A set of protocols that specify how your Wi-Fi network and other data transmissions work.
Processes commands to a computer program in the form of lines of text.
A list of specific routing destinations; essentially a map for the router.
An electronic device which is required for communication between devices.
An internal component of a computer that is used for communicating over a network.
A network device that allows a device to connect to the Internet.
Enables wired connections between more than one computer or device.
A network device that allows other Wi-Fi devices to connect to a wired network.
A systematic approach to solving a problem.
Displays the HTML, CSS, and JavaScript code of a website.
Browser tools that help programmers diagnose problems, build and maintain secure websites.
Used for inspecting and making live-edits of the HTML and CSS.
Used for entering live JavaScript for testing and debugging.
Used for inspecting all resources that are loaded like databases, storage, cookies, images, etc.
Temporary storage that is emptied when the browser is closed.
Persistent storage; should be encrypted.
Stores website data such as HTML and CSS to reduce load time.
Stores website preferences and personal data.
Used for debugging issues and checking the website’s digital certificate.
A collection of numbers or data points.
Created when a collection of data is organized or structured.
Pulls meaning from information by analyzing the organized data and generating insights.
This is when data is being accessed by a person or program.
This is when data is actively moving from one location to another.
This is when data is stored in a specific place that isn’t actively moving to other devices or networks.
A collection of data that is organized in a structured way.
A category of information.
A single entry in a database table.
A specific category of data within a record.
An electronic system that allows data to be easily accessed, updated, and manipulated.
The set of rules that define how commands and instructions are written.
A request for information from a database.
Refers to an attack where a cybercriminal attempts to use an input field to write and run malicious SQL statements.
An attack in which malicious scripts are sent to users through a website.
A programming technique used to validate the input from the user. The code will check the data that the user inputs and make sure it fits certain criteria. This ensures that only the correct type of value is used within the input field.
A section of memory set aside to be used for a specific reason.
Occurs when there is more data put into a buffer than it can handle.
Used by programmers to avoid revealing valuable clues to potential attackers.
An error that occurs when the result of an integer operation does not fit within the allocated memory space.
a weakness which can be exploited by a malicious actor / attacker to perform unauthorized actions within a computer system.
A cyber threat is the potential harm that could be caused by someone taking advantage of a vulnerability.
Cyber attacks occur when threat actors exploit, or take advantage of, vulnerabilities to execute a malicious plan to harm a network, computer system, or organization
Nmap (Network Mapper) is a free and open source tool that scans systems over a network and provides a wealth of information about them, such as their open ports.
Risk management is the process of identifying, evaluating, and addressing an organization's cybersecurity threats.
A term used in programming for the set of instructions that can be run or executed by a computer.
Translates and executes program code line by line into machine code.
Translates, or “compiles” the entire code into machine code and then runs the program, or sets aside to run later.
Uses tags to format and define elements within a document. The tags are not shown when the document is displayed.
Used to make queries, or searches, in databases and information systems.
A programming language that is very close to machine code and used for a specific type of processor.
Uses a series of commands within a file that is capable of being executed without being compiled.
An identifier that stores data or information and can be changed at any time.
An identifier that stores data or information and cannot be changed.
A number can be positive, negative, or zero WITHOUT a decimal component. -50; 0; 5
A number can be positive, negative, or zero WITH a decimal component. 3.2; 0.0; 4.5652
Contains text or a sequence of letters, numbers, punctuation, spaces, etc. "Hello, world!"; "abc123"
Contains a single character or punctuation. a; z; 1; !; #
Binary and evaluates to either true or false. true; false
Defining a function means to teach the computer a new command and explain what it should do when receiving that command.
Calling a function actually gives the command, so the computer will run the code for that function.
A set of steps that uses the structural conventions of programming but is intended for human reading.
Phrases entered into code to provide information or direction.
A diagram made up of shapes and arrows used to display the order of steps in a program or process.
An if statement lets you ask a question to the program and only run code if the answer is true.
Control structure that lets us run either one section of code or another depending on a test.
A control structure lets us change the flow of the code.
Using a condition to determine which part of an algorithm is executed.
A fixed container that stores an ordered collection of items.
A resizable container that stores an ordered collection of items.
Can store combinations of keys and values where the value can be accessed by its associated key.
The variables that are attached to the object.
An object’s characteristics.
Defines what an object can do.
A SQL clause that sorts the returned query results by one or more columns
Ascending order; the default sort direction
Descending order; used to reverse the default sorting
A SQL operation that combines rows from two or more tables based on a related column.
A join where each row in one table is paired with every row in another.
A field in one table that refers to the primary key in another table.
A temporary name assigned to a column or table using the `AS` keyword in SQL
A SQL keyword used to rename fields or tables in the query result
A document that summarizes a person’s education, work experience, skills, and accomplishments
Personal attributes such as teamwork, communication, and time management
Technical or learned abilities like programming, software use, or typing speed