- domain names: A domain name is a unique name that identifies a website on the internet.
- URL: A URL (Uniform Resource Locator) is a reference or address that specifies the location of a resource on the Internet.
- DSL: Digital subscriber line is a family of technologies that are used to transmit digital data over telephone lines.
- IP address: An IP address is used to identify computers and devices on a WAN like the internet.
- Ethernet: A system for connecting computers within a local area network (LAN) using physical wiring to carry the data. It’s a protocol that controls how data is transmitted over a LAN and is the most widely installed LAN technology.
- MAC address: A media access control address is a unique identifier assigned to a network interface controller for use as a network address in communications within a network.
- Network protocols: A network protocol is a set of rules for communication between devices over a network.
- Encryption: Encryption is the process of converting data into a code or cipher, so that only authorised parties who possess the key or password can access the original information.
- Protocol: A network protocol is a set of rules for communication between devices over a network.
- Encapsulated: Encapsulation in networking is the method of wrapping data with necessary protocol information before it’s transmitted over a network.
- Bandwidth: Bandwidth in computing refers to the maximum rate of data transfer across a given path or network.
- Interoperability: Interoperability is the ability of different systems, devices, applications, or networks to communicate and work together effectively.
- Hackers: Individuals or groups who exploit system vulnerabilities to gain unauthorised access to data.
- Viruses: Malicious software programs designed to spread from one computer to another and interfere with normal operations.
- Malware: Malicious software designed to harm or gain unauthorised access to a system or network.
- Worm: A worm is similar to a virus but is a standalone program that can spread and replicate itself over computer networks. It can take up storage space or bandwidth.
- Trojan horse: A Trojan horse is a program that disguises itself as a legitimate program or file, but when installed, it can delete data or damage hardware.
- Spyware: Spyware is software that records all key presses and transmits these to a third-party.
- Adware: Adware is software that displays unwanted advertisements on the computer without the user’s consent. Some of these may contain spyware, and some may link to viruses when clicked.
- Ransomware: Ransomware is malware that encrypts the user’s files and demands a ransom payment to decrypt them. It can cause data loss and financial damage and disrupt business operations.
- DoS attack: A DoS attack is where a computer floods a server with lots of requests at the same time, which the server can’t respond to, causing it to crash or become unavailable to users.
- DDoS attack: A DDoS attack is where similar to a DoS attack but instead multiple computers are used as bots which send the requests to the server.
- SQL injection: An attack technique used to exploit security vulnerabilities in a website, where malicious SQL statements are inserted into an entry field for execution.
- Phishing: Attempting to acquire sensitive information by masquerading as a trustworthy entity in an electronic communication.
- Pharming: This is a cyber attack intended to redirect a website’s traffic to another bogus site.
- Social engineering: Social engineering involves manipulating individuals to gain access to confidential information or to perform an action that benefits the attacker.
- Firewalls: Network security systems that monitor and control incoming and outgoing network traffic based on predetermined security rules.
- Secure Passwords: Using strong, complex, and unique passwords helps to protect against unauthorised access.
- Anti-virus Software: Programs designed to detect and neutralise or remove malicious software like viruses, worms, and Trojans.
- Anti-spyware Software: Tools to detect and remove spyware and other kinds of malware.
- Two-factor Authentication (2FA): Adds an additional layer of security by requiring users to provide two forms of identification - usually a code sent to their phone or email as well as their password.
- Regular Software Updates: Keeping all systems and software up-to-date ensures you have the latest security patches.
- Employee training: can be essential to instil a culture of security consciousness within the company.
- A strong security policy: (e.g. insisting on regular password changes) can further help in maintaining a secure network environment.