Privacy & Security Glossary
A
Authentication
The process of verifying the identity of a user or system, typically through passwords, biometrics, or security tokens.
Authorization
The process of determining what permissions and access rights a user has within a system.
B
Breach
An incident where unauthorized access to data occurs, potentially exposing sensitive information.
C
Cryptography
The practice of securing communication and data through encoding techniques.
D
Data Privacy
The proper handling, processing, and storage of personal information.
E
Encryption
The process of converting data into a coded format to prevent unauthorized access.
F
Firewall
A network security system that monitors and controls incoming and outgoing network traffic.
H
Hash Function
A mathematical function that converts data into a fixed-size string of characters.
M
Multi-Factor Authentication (MFA)
A security system requiring multiple forms of verification before granting access.
P
Password Manager
A tool that securely stores and manages passwords for various accounts.
Phishing
A cyberattack method where attackers pose as legitimate entities to steal sensitive information.
S
SSL/TLS
Security protocols that provide encrypted communication between web browsers and servers.
T
Two-Factor Authentication (2FA)
A security process requiring two different forms of identification to access an account.
V
VPN
Virtual Private Network - A service that encrypts internet traffic and masks IP addresses.