Network Vocab
Network Examples
Internet Security Vocab
More Internet Security Vocab
100

Two or more computers that are linked in order to share resources or information

What is a Network?

100

A school districts private network is an example of this kind of network.

What is a Local Are Network (LAN)?

100

A small bit of text placed on the hard drive of  your computer by the server of a website that you visit

What is a Cookie?

100

The trail of data you create while using the Internet.

What is a Digital Footprint?

200

A telecommunications network that extends over a large geographical distance, like the internet.

What is a Wide Area Network (WAN)?

200

In order to travel more quickly, data is broken into these as it travels across networks.

What are packets?

200

Process of gathering and analyzing information about an individual that exists online.

What is Digital Profiling?

200

Temporary storage of web documents.

What is Cache?

300

A unique string of numbers assigned to your computer to identify your location.

What is an IP address?

300

Cloud computing that can access applications online like Google Docs. 

What is Software as a Service (SAAS)

300

The process of encoding  information so that only authorized parties can access it and those who are not authorized cannot

What is Encryption?

300

Fraudulent attempt to obtain sensitive information (such as passwords or financial information) by pretending to be a legitimate entity.

What is Phishing?

400

The duplication of critical components or functions of a system to increase reliability, for example, having a back-up of your data

What is redundancy?

400

Cloud computing service that can be used to develop your own applications.

What is Platform as a Service (PAAS)?

400

A sequence of operations that ensure protection of data.

What are Security Protocols?

400

A weakness that can be exploited by a threat, such as an attacker, to perform unauthorized actions within a computer system.

What is Vulnerability?

500

A system of rules that allow two or more devices to communicate information to one another.

What are Protocols?

500

Cloud computing service that can be used to create Virtual Machines.

What is Infrastructure as a Service (IAAS)?

500

Potential threats to your network are identified from a hypothetical attacker’s point of view in order to keep your information safe.

What are Threat Models?

500

A type of encryption that uses public and private keys to send data.

What is Asymmetrical encryption?