A genre in gaming that allows users to play within a virtual, free roaming environment.
Sandbox
Typically a person, group or organization that has a presence in a social network.
Ensuring that data is protected from unauthorised access, use, or disclosure.
Privacy
A diagram that shows how data moves between processes, data stores, and external entities in a system.
Data Flow Diagram
Concerns that affect a large amount of people and how they interact with each other.
Social issues
The measure of the importance or influence of a node within a network.
Centrality
Someone who engages in cyber activities to make political statements and raise awareness about certain issues.
Hacktivist
A level of DFD that provides a high-level overview of the entire system, showing only the main process and its interactions.
Level 0
A lossless compression format suitable for images with transparent backgrounds or requiring high quality.
PNG
A device similar to a hub, however it can send data to specific nodes so only they receive the data they require.
Switch
A form of cyberattack where a malicious Wi-Fi network mimics a legitimate one, intercepting sensitive information from unsuspecting users.
Evil twin
In a Level 1 DFD, this element represents a transformation of input data into output data.
Process
The ownership of creative, mentally derived or problem-solving ideas or products.
Intellectual property
Cables that consist of two thin insulated wires, twisted together to form a spiral to reduce the amount of interference from other cabling.
Twisted pair
They infiltrate networks to uncover security flaws, and report their findings to the system owner
White hat attacker
A DFD component that stores data that can be retrieved or updated by processes, and is typically represented by two parallel lines.
Data store
An iterative and flexible project management approach with short cycles and frequent feedback.
Agile approach
Refers to the ability of different devices, systems or technologies to communicate and work together seamlessly, regardless of their manufacturer, model or software environment.
Device interoperability
A sub-category of phishing that involves sending fraudulent SMS messages to trick individuals into sending personal information.
Smishing
A modelling tool often used alongside DFDs to describe the logical steps and decisions within a process.
Flowchart