A temporary wireless network that does not rely on fixed hardware such as routers, e.g. a personal hotspot created using a mobile phone
AD HOC
Travel to and from your place of work – eliminated when working from home
COMMUTE
Hacker who attempts to hack into systems for criminal reasons to steal data or extort money
BLACK HAT
Software used to identify and remove malware
ANTIVIRUS
Material left over from manufacturing a product or the product itself upon reaching end of life – needs to be recycled or disposed of
WASTE
Area without mobile phone coverage – e.g. a valley surrounded by high mountains
BLACK SPOT
Electronic form of messaging sent between individuals, employees, businesses and customers; sometimes with attachments or other media
Malware that restricts a user's access to their computer system to make them give money to the attacker
RANSOMWARE
If you need to type in your address, some of the fields might appear pre?populated if you've typed in your address before
AUTOCOMPLETE
Process where existing technology is replaced with newer or higher?performance technolog
UPGRADING
Using online services instead of local applications – e.g. editing a document from a web browser
CLOUD COMPUTING
Working away from the office such as at home
REMOTE WORKING
When an employee deliberately discloses confidential information outside of their organisation
LEAKING
Use of personal identifiable features to grant access to a system, e.g. fingerprints, iris, voice
BIOMETRICS
Increased digital surveillance and the rise of social media have led to concerns relating to this
PRIVACY
Data storage technology where data is stored on remote servers accessed from the Internet
CLOUD STORAGE
For most people, working with and collaborating with others relieves boredom and is stimulating, improving their
MENTAL WELL-BEING
The duration that systems are not operational, e.g. if taken offline to investigate a security breach
DOWNTIME
Scrambling data so that it can only be read by users with the appropriate translation 'key'
ENCRYPTION
After an attack, the first stage is to ____ – to see what happened and how bad the attack was
INVESTIGATE
Software that allows several people to communicate online or share and edit documents (sometimes simultaneously)
COLLABORATION TOOLS
A description of an image on a page so that screen readers can read out a description of the image
ALT TEXT
Spying on governments and businesses to obtain secrets / trade secrets / intellectual property, including access and data theft by hackers
ESPIONAGE
General term applied to devices which have been designed or modified to prevent intrusion by hackers or malware
Device Hardening
Set of rules which govern or restrict the ways in which a computer system or network may be used
ACCEPTABLE USE POLICY