Privacy & Security Glossary

A

Authentication

The process of verifying the identity of a user or system, typically through passwords, biometrics, or security tokens.

Authorization

The process of determining what permissions and access rights a user has within a system.

B

Breach

An incident where unauthorized access to data occurs, potentially exposing sensitive information.

C

Cryptography

The practice of securing communication and data through encoding techniques.

D

Data Privacy

The proper handling, processing, and storage of personal information.

E

Encryption

The process of converting data into a coded format to prevent unauthorized access.

F

Firewall

A network security system that monitors and controls incoming and outgoing network traffic.

H

Hash Function

A mathematical function that converts data into a fixed-size string of characters.

M

Multi-Factor Authentication (MFA)

A security system requiring multiple forms of verification before granting access.

P

Password Manager

A tool that securely stores and manages passwords for various accounts.

Phishing

A cyberattack method where attackers pose as legitimate entities to steal sensitive information.

S

SSL/TLS

Security protocols that provide encrypted communication between web browsers and servers.

T

Two-Factor Authentication (2FA)

A security process requiring two different forms of identification to access an account.

V

VPN

Virtual Private Network - A service that encrypts internet traffic and masks IP addresses.

Privacy-First Design