• domain names: A domain name is a unique name that identifies a website on the internet.
  • URL: A URL (Uniform Resource Locator) is a reference or address that specifies the location of a resource on the Internet.
  • DSL: Digital subscriber line is a family of technologies that are used to transmit digital data over telephone lines.
  • IP address: An IP address is used to identify computers and devices on a WAN like the internet.
  • Ethernet: A system for connecting computers within a local area network (LAN) using physical wiring to carry the data. It’s a protocol that controls how data is transmitted over a LAN and is the most widely installed LAN technology.
  • MAC address: A media access control address is a unique identifier assigned to a network interface controller for use as a network address in communications within a network.
  • Network protocols: A network protocol is a set of rules for communication between devices over a network.
  • Encryption: Encryption is the process of converting data into a code or cipher, so that only authorised parties who possess the key or password can access the original information.
  • Protocol: A network protocol is a set of rules for communication between devices over a network.
  • Encapsulated: Encapsulation in networking is the method of wrapping data with necessary protocol information before it’s transmitted over a network.
  • Bandwidth: Bandwidth in computing refers to the maximum rate of data transfer across a given path or network.
  • Interoperability: Interoperability is the ability of different systems, devices, applications, or networks to communicate and work together effectively.
  • Hackers: Individuals or groups who exploit system vulnerabilities to gain unauthorised access to data.
  • Viruses: Malicious software programs designed to spread from one computer to another and interfere with normal operations.
  • Malware: Malicious software designed to harm or gain unauthorised access to a system or network.
  • Worm: A worm is similar to a virus but is a standalone program that can spread and replicate itself over computer networks. It can take up storage space or bandwidth.
  • Trojan horse: A Trojan horse is a program that disguises itself as a legitimate program or file, but when installed, it can delete data or damage hardware.
  • Spyware: Spyware is software that records all key presses and transmits these to a third-party.
  • Adware: Adware is software that displays unwanted advertisements on the computer without the user’s consent. Some of these may contain spyware, and some may link to viruses when clicked.
  • Ransomware: Ransomware is malware that encrypts the user’s files and demands a ransom payment to decrypt them. It can cause data loss and financial damage and disrupt business operations.
  • DoS attack: A DoS attack is where a computer floods a server with lots of requests at the same time, which the server can’t respond to, causing it to crash or become unavailable to users.
  • DDoS attack: A DDoS attack is where similar to a DoS attack but instead multiple computers are used as bots which send the requests to the server.
  • SQL injection: An attack technique used to exploit security vulnerabilities in a website, where malicious SQL statements are inserted into an entry field for execution.
  • Phishing: Attempting to acquire sensitive information by masquerading as a trustworthy entity in an electronic communication.
  • Pharming: This is a cyber attack intended to redirect a website’s traffic to another bogus site.
  • Social engineering: Social engineering involves manipulating individuals to gain access to confidential information or to perform an action that benefits the attacker.
  • Firewalls: Network security systems that monitor and control incoming and outgoing network traffic based on predetermined security rules.
  • Secure Passwords: Using strong, complex, and unique passwords helps to protect against unauthorised access.
  • Anti-virus Software: Programs designed to detect and neutralise or remove malicious software like viruses, worms, and Trojans.
  • Anti-spyware Software: Tools to detect and remove spyware and other kinds of malware.
  • Two-factor Authentication (2FA): Adds an additional layer of security by requiring users to provide two forms of identification - usually a code sent to their phone or email as well as their password.
  • Regular Software Updates: Keeping all systems and software up-to-date ensures you have the latest security patches.
  • Employee training: can be essential to instil a culture of security consciousness within the company.
  • A strong security policy: (e.g. insisting on regular password changes) can further help in maintaining a secure network environment.