Internet privacy is becoming quite common nowadays. Compared to let’s say 10 years ago, people are more educated and more keen on adopting new technologies to control their online footprint.
However, with a slew of the tech jargon being thrown around, it can be quite difficult to understand what the heck they even mean.
To make it a bit easier for you, I’ve scoured the internet for the most used tech jargons in the realm of online privacy and curated a super simple glossary that even a toddler can understand.
- Adware
- Anti-virus
- Authentication
- Botnet
- Breach
- Cookie
- Cybercrime
- Decryption
- Denial of Service (DoS)
- Encryption
- Firewall
- Hacker
- ISP
- IP Address
- Ransomware
- (SSL) Secure Socket Layer
- Spam
- Trojan
- URL
- Vulnerability
- Virus
- SSH
- PII
- Transparency
- Confidentiality
- Peer-to-Peer (P2P)
- Phishing
- Opt-in / opt-out
- Anonymity
- Confidentiality
- Privacy policy
- Web beacons
- Logs
- Obfuscation
- World Wide Web Consortium (W3C)
- Browser Extension
- Cipher
- Connection Logs
- Virtual Private Network (VPN)
- IPsec
- GDPR
- AES (Advanced Encryption Standard)
- DNS Leak
- Five-Eyes
- PPTP
- Dark Web
- DD-WRT
- DMCA Notice
- DNS (Domain Name System)
- Proxy
- Tor
- VPN Client
- VPN Tunnel
- Dedicated IP
- Shared IP Address
- Sideloading
- Geo-Restrictions
- IP Leak
- Kill Switch
- OpenVPN
- Simultaneous Connections
- Smart DNS
1. Adware
Adware is special software that is used for advertising. This type of software is typically considered unwanted as it’s prone to displaying unsolicited ads.
2. Anti-virus
Anti-virus software is a computer program that is used to detect, stop, and prevent malicious codes from exploiting computing resources. To find out more in between Antivirus vs VPN check out our guide to Antivirus vs VPN.
3. Authentication
Authentication is the process of verifying the identity of a user or a device prior to allowing access to a computing system.
4. Botnet
A Botnet is a network of computers or web-connected devices comprised of servers, PCs, and mobile devices that are infected and maliciously controlled through shared malware. A botnet is used for sending spam, spreading malware, or for executing Distributed Denial of Service attacks.
5. Breach
A breach is described as an event that involves malicious entities gaining unauthorized access to data, devices, or even networks through bypassing security mechanisms.
6. Cookie
A cookie is a small string of text stored by a web browser that enables websites to remember basic information about you and your personal settings. Store information may include, log in details and website preferences.
7. Cybercrime
Cybercrime is any illegal activity carried out over the Internet. Cybercrime is directed at computers and involves maliciously modifying electronic data or seeking ransom for hijacked computing resources or data.
8. Decryption
Decryption refers to the decoding of encrypted messages.
9. Denial of Service (DoS)
DoS or Denial-of-Service is a malicious attack used to make an online service such as a website unavailable for legitimate users. DoS attacks involve flooding target systems with an overwhelming number of requests until the service becomes unavailable.
10. Encryption
Encryption is the process of making the information unreadable to everyone by changing the ordinary text into a ciphertext for the purpose of security and privacy. The encrypted information can be decrypted by using appropriate secret keys.
11. Firewall
A Firewall is hardware or software used to prevent unauthorized access to a computer by monitoring information passing to and fro a computer or the network.
12. Hacker
A hacker is a fraudulent individual whose primary intent is to gain unauthorized access to a computer system through exploiting vulnerabilities.
13. ISP
ISP or internet service provider is a company that offers access to the internet.
14. IP Address
The IP address or Internet Protocol address is comprised of numbered strings that are used for uniquely identifying computers on the Internet. An IP address looks something like this – 192.166.12.14 and is required by every computer to connect to the Internet.
15. Ransomware
Ransomware is malicious software that is designed to hijack computers or takeover sensitive data in order to demand ransom in exchange.
16. (SSL) Secure Socket Layer
Secure socket layer or SSL is used to identify whether the connection between your computer and the website you’re visiting is encrypted or not. SSL is the most widely used protocol on the internet and primarily used by banking and e-commerce websites.
17. Spam
Any unsolicited email on a mass scale is referred to as spam. Spam usually entails commercial advertising of dubious products.
18. Trojan
A Trojan is a computer program that might appear to be useful, however, in reality; its true nature is malicious. When interacted with, Trojan programs deploy malicious codes to harm computer resources.
19. URL
URL or a Universal Resource Locator is used to locate internet resources such as websites or images on the internet.
20. Vulnerability
Vulnerability referrers to the inherent weakness of a computer system that can be exploited or compromised by a malicious attacker.
21. Virus
A virus is malware designed to harm a computer system and multiply to consume resources and memory.
22. SSH
SSH or Secure Socket Shell is a network protocol that enables users and system administrators to securely access computer systems over unsecured networks. SSH implements powerful authentication and encrypting between two computers communicating over the internet.
23. PII
PII or Personally Identifiable Information is any information about an individual that can be used to uniquely distinguish an individual’s identity. This information includes names, social security numbers, medical, financial, or other information.
24. Transparency
Providing the general public or employees with a company’s inner workings by making it available online in a format that can be downloaded or viewed by a common man is referred to as transparency.
25. Confidentiality
Confidentiality refers to not making information available or disclosed to unauthorized personals, entities, or processes.
26. Peer-to-Peer (P2P)
Peer-to-peer or P2P is an efficient decentralized file-sharing system that uses distributed personal computers as opposed to traditional centralized servers for sharing files.
27. Phishing
Phishing refers to the distribution of phony emails or fraudulent websites designed to scam or gain access to sensitive data through manipulation.
28. Opt-in / opt-out
Opt-in refers to giving primarily digital marketers your consent for receiving commercial messages through email or online advertisements.
The opt-in option basically gives users an idea of what they’re registering for and is used by websites or services that carry out massive promotional campaigns through emails, newsletters or advertisements.
Opt-out, on the other hand, gives users the option to object any form of direct marketing.
29. Anonymity
Anonymity is described as a situation in which a person or a computer cannot be uniquely identified.
30. Confidentiality
Confidentiality is described as a situation in which information is not disclosed and kept a secret from unauthorized entities.
31. Privacy policy
The privacy policy is a governing document that describes how a website collects, handles, and processes the personal information of an online visitor.
32. Web beacons
A web beacon, also known as a web bug, or a pixel tag, is an invisible image that is embedded into emails and lets the sender know when an email message has been opened.
33. Logs
Any information collected or retained for fact-checking is called a log file.
34. Obfuscation
Obfuscation is derived from obscure and basically refers to making information difficult to understand.
35. World Wide Web Consortium (W3C)
The World Wide Web Consortium (W3C) is an international organization responsible for developing and governing web standards.
36. Browser Extension
Browser extension refers to an add-on plugin or a plugin that serves different purposes and can be installed on web browsers to enhance functionality.
37. Cipher
Cipher refers to a mathematical algorithm that is used to encrypt data.
38. Connection Logs
Connection Logs are primarily stored by VPN providers and are used for troubleshooting purposes. Connection logs basically contain information about connection time stamps, data consumed and the number of devices using a single account.
39. Virtual Private Network (VPN)
VPN or Virtual Private Network is a sophisticated technology that uses encryption to add security and privacy to private and public networks.
40. IPsec
IPsec or Internet Protocol Security is a secure network protocol used in virtual private networks that encrypts data packets sent over a network.
41. GDPR
GDPR or General Data Protection Regulation is a framework that establishes and governs guidelines for the safe collection and processing of personal information of individuals living in the European Union.
42. AES (Advanced Encryption Standard)
AES or the Advanced Encryption Standard is one of the most commonly used encryption protocols in the world to encrypt sensitive data. It is near impossible to break block cipher and chosen by the U.S. government to encrypt classified information.
43. DNS Leak
DNS leak is primarily discussed in the realm of VPNs when a DNS request is processed through an ISP’s DNS server rather than through a VPN provider. This contributes to exposing a user’s true IP address.
44. Five-Eyes
FVEY or the Five Eyes is an infamous global surveillance alliance comprised of the US, UK, Australia, Canada, and New Zealand.
45. PPTP
PPTP or Point-to-Point Tunneling Protocol is a fast but obsolete VPN protocol with known security vulnerabilities.
46. Dark Web
The dark web is a network infrastructure that is comprised of websites that are mostly linked to illegal activities and cannot be accessed through regular search engines.
47. DD-WRT
DD-WRT is an open-source firmware for wireless routers based on the Linux platform. This open-source firmware is typically used to flash existing firmware for more control. Typically, DD-WRT firmware is to configure VPN software directly onto a router.
48. DMCA Notice
DMCA or Digital Millennium Copyright Act is a legal notice of copyright infringement sent by copyright holders to ISPs.
49. DNS (Domain Name System)
DNS or Domain Name System is used to translate web addresses or URLs into numeric IP addresses.
50. Proxy
A proxy server is basically an intermediary computer on the web that acts as a gateway between you and the internet. Instead of you accessing the web resource yourself, the proxy server does it for you. See the difference in between Proxy and VPN.
51. Tor
Tor or The Onion Router is a free open-source secure browser that offers anonymity by hiding the originating data source through routing. Have a look in between Tor vs VPN.
52. VPN Client
VPN client is cross-platform compatible software that is used to access and connect to secure VPN servers.
53. VPN Tunnel
VPN tunnel refers to the encrypted secure connection that is established between a VPN user and the VPN server.
54. Dedicated IP
A dedicated IP is an exclusive and unique internet address only assigned and used by a single user.
55. Shared IP Address
As the name suggests, the assignment of a single IP address to multiple users is referred to as a shared IP. While it does have some implications, shared IP makes it quite difficult to uniquely distinguish users.
56. Sideloading
Sideloading refers to installing apps onto a device without using proprietary sources like the App store or the Play Store for example.
57. Geo-Restrictions
Geo-Restriction refers to restricting access to web-based content in certain parts of the world.
58. IP Leak
IP Leak is also a term that is discussed mostly in the realm of VPNs and refers to an incident in which the apps or websites you’re interacting with can see your true IP address.
59. Kill Switch
Kill Switch is a built-in failsafe mechanism in the VPN app that’s designed to prevent your actual IP address from being exposed to your ISP.
60. OpenVPN
Just like the name suggests, OpenVPN is a highly configurable open-source multiplatform software that’s designed to offer a perfect blend of privacy and performance. In the world of VPNs, OpenVPN is the most secure and widely used VPN protocol.
61. Simultaneous Connections
A simultaneous connection is a term mostly used in the realm of VPNs and basically refers to the number of devices simultaneously using a VPN at a specific time.
62. Smart DNS
Smart DNS is a rather sophisticated technology that enables internet users to spoof their geolocation and access geo-blocked content by connecting to DNS servers located in different parts of the world. This technology works quite similar to VPNs, however, without any encryption.