Glossary Our ever-popular Data Watch feature includes a few technical terms that most of us don’t encounter too often. If you’re curious to learn more, here is our glossary of terms and definitions! Article | Stuart Walsh, CISO at Blue Stream Academy
Firewall
In computing, a firewall is a security system that monitors and controls data moving in and out of a network of computers. A firewall is like a barrier that separates a trusted network (such as computers in an office) and an untrusted network (such as the internet).[1],[2]
Internet Footprint
Your internet footprint (also known as a digital footprint or digital shadow) is the unique set of digital activities, actions, contributions and communications that can be traced to you on the internet or digital devices. Digital footprints can be passive or active. Your passive digital footprint is your web-browsing activity and information stored as cookies.
Hacktivism
Hacktivism or hactivism (a portmanteau of hack and activism) is the use of computer-based techniques (such as hacking) as a form of civil disobedience to promote a political agenda or social change. It is often related to free speech, human rights, or freedom of information movements.[3]
Your active digital footprint is mostly information that you choose to share on websites or social media. A digital footprint can be left by a person, a business or an organisation.[4]
Phishing
Phishing is when attackers attempt to trick you into doing ‘the wrong thing’, such as clicking a bad link that will download malware (such as ransomware) or direct you to a malicious website. Phishing can be done by text message, social media or phone, but it is mainly used to describe attacks that arrive by email. Phishing emails can reach millions of users directly, and hide among the huge number of benign emails that busy users receive. Attacks can install malware, sabotage systems or steal intellectual property and money.[7] 26