Navigate the critical terms related to securing digital environments and protecting private information. This category addresses encryption, cybersecurity measures, data protection protocols, and privacy laws. Gain knowledge on how to safeguard data and understand the mechanisms in place to protect user privacy in an increasingly connected world.
Skip to Letter
A
Account Recovery (): Account recovery is the process of regaining access to your online account for your home internet service when you have lost or forgotten your login credentials.
Authenticator App (): An authenticator app is a smartphone application that generates time-based, one-time passcodes for securely logging into online accounts and services.
B
Backup Codes (): Backup codes are a set of one-time use codes that serve as a secondary authentication method for accessing online accounts when the primary method, such as two-factor authentication (2FA), is unavailable.
C
Camera Permissions (): Camera permissions refer to the ability of websites or applications to access a user's camera when using residential broadband internet.
Content Filtering (): Content filtering is a feature or service that allows internet users to block or restrict access to certain types of online content, such as websites, apps, or media that may be inappropriate, offensive, or harmful.
Cybersecurity (): Cybersecurity in telecommunications and residential broadband refers to the measures taken to protect internet users, their devices, and their data from digital threats when using home internet services.
D
Data Privacy (): Data privacy refers to the protection of personal information and online activities from unauthorized access, use, or disclosure by internet service providers (ISPs) and other entities involved in the provision of telecommunications and residential broadband services.
Data Retention (): Data retention refers to the practice of storing customer data, such as internet browsing history, call records, and location information, by telecommunications companies and internet service providers (ISPs) for a specified period.
Digital Identity (): Digital identity refers to the online representation of an individual or household, encompassing their personal information, online accounts, and digital footprint associated with their internet and telecommunications services.
Digital Signature (): A digital signature in the context of blockchain technology is a cryptographic mechanism used to verify the authenticity and integrity of a transaction or message, ensuring that it originated from a specific sender and has not been tampered with.
E
Encrypted Video Calls (): Encrypted video calls are a secure way to communicate using video conferencing technology, where the audio and video data transmitted between participants is protected from unauthorized access or interception.
Encryption (): Encryption is the process of encoding information to protect it from unauthorized access, ensuring that only intended recipients can view the data.
Encryption Protocols (): Encryption protocols are methods used to secure data transmitted over the internet, protecting sensitive information from unauthorized access.
End-To-End Encryption (): End-to-end encryption is a secure communication method that ensures only the sender and intended recipient can read the messages or access the transmitted data, preventing interception by third parties, including service providers.
End-To-End Encryption (E2EE) (): End-to-end encryption (E2EE) is a secure communication method that ensures only the sender and intended recipient can read the messages or data transmitted between them, preventing unauthorized access by third parties, including internet service providers.
H
HTTPS (Hypertext Transfer Protocol Secure) (): HTTPS is a secure version of the standard web communication protocol that encrypts data exchanged between a user's web browser and the website they are visiting, protecting sensitive information from being intercepted by third parties.
I
Incognito Mode (): Incognito mode is a privacy feature in web browsers that prevents the browser from saving your browsing history, cookies, and site data while it is enabled.
Internet of Things (IoT) security (): Internet of Things (IoT) security refers to the measures taken to protect internet-connected devices and networks in homes from unauthorized access, misuse, and cyber threats.
N
Network Security (): Network security refers to the measures and practices implemented to protect a home network and connected devices from unauthorized access, cyber threats, and data breaches.
Network Security Key (): A network security key is a password or passphrase used to authenticate and authorize access to a wireless network, ensuring that only approved devices can connect and communicate securely.
No-Logging Policy (): A no-logging policy is a commitment by an internet service provider (ISP) or a virtual private network (VPN) provider to not collect, store, or share data about their users' online activities.
O
Online Privacy (): Online privacy refers to the protection of personal information and data when using the internet, particularly in the context of residential broadband and telecommunications services.
Opt-out (): Opt-out, in the context of website settings, refers to the ability of users to choose not to participate in certain features or services, such as data collection, targeted advertising, or email newsletters.
P
Padlock Icon (): The padlock icon is a visual symbol displayed in web browsers to indicate that a website uses a secure, encrypted connection to protect users' sensitive information.
Parental Controls (): Parental controls are features or tools provided by telecommunications and residential broadband services that allow parents to monitor and restrict their children's access to online content and activities.
Password (): A password is a secret word, phrase, or combination of characters used to authenticate a user's identity and grant access to a protected system, service, or network, such as a home Wi-Fi network or online account.
Password Manager (): A password manager is a software tool that helps users securely store, organize, and manage their login credentials for various online accounts and services.
Password Strength (): Password strength refers to the effectiveness of a password in resisting guessing and brute-force attacks, which is crucial for protecting your online accounts and sensitive information.
Phishing (): Phishing is a fraudulent attempt to steal sensitive information, such as login credentials or financial data, by disguising as a trustworthy entity in electronic communication, often targeting residential broadband users.
Privacy Policy (): A privacy policy in the context of telecommunications and residential broadband is a statement that discloses how an internet service provider (ISP) collects, uses, shares, and protects the personal information of its customers.
Privacy Shutter (): A privacy shutter is a physical cover for a webcam or camera lens that can be opened or closed to control when the camera is able to capture images or video.
Private Browsing (): Private browsing is a feature in web browsers that allows users to surf the internet without saving their browsing history, cookies, or temporary files on their device.
Private Key (): A private key is a secure, encrypted code that allows an individual to access and manage their cryptocurrency or digital assets within a wallet.
Public Key (): A public key is a cryptographic code that allows a user to receive cryptocurrencies or other blockchain-based assets into their account.
S
Safe Search (): Safe Search is a feature offered by search engines and internet service providers to filter out explicit or inappropriate content from search results, helping to create a safer online experience for users, especially children.
Secure Checkout (): Secure Checkout is a feature that ensures the safety and privacy of personal and financial information during online transactions, protecting users from potential fraud or data theft.
Secure Messaging (): Secure messaging refers to the practice of sending and receiving messages in a way that protects the privacy and confidentiality of the communication between parties.
Secure Website (): A secure website is an online platform that uses encryption and other security measures to protect users' sensitive information and ensure safe interactions when accessing the site through a residential broadband connection.
Seed Phrase (): A seed phrase, also known as a recovery phrase or mnemonic phrase, is a sequence of words used to securely backup and restore access to a cryptocurrency wallet.
Self-Sovereign Identity (): Self-Sovereign Identity (SSI) is a concept that allows individuals to have full control over their digital identities, enabling them to securely manage and share their personal information without relying on centralized authorities.
Self-Sovereign Identity (SSI) (): Self-Sovereign Identity (SSI) is a concept that allows individuals to have full control over their digital identities, enabling them to securely manage and share their personal information without relying on centralized authorities.
Spam (): Spam refers to unsolicited and unwanted electronic messages, typically sent in bulk via email, text messages, or other digital communication channels.
SSL Certificate (): An SSL (Secure Sockets Layer) certificate is a digital certificate that enables secure, encrypted communication between a website and a user's web browser, ensuring the privacy and integrity of data transmitted over the internet.
SSL/TLS (): SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are cryptographic protocols that provide secure communication over the internet, ensuring that data transmitted between a user's device and a website remains private and unaltered.
T
Two-Factor Authentication (2FA) (): Two-Factor Authentication (2FA) is an extra layer of security that requires users to provide two forms of identification to access their accounts or services, helping to protect against unauthorized access.
U
Unsubscribe (): Unsubscribe refers to the action of opting out or requesting to be removed from the mailing list or distribution of these reports.
V
Verifiable Credentials (): Verifiable Credentials are digital documents that prove an individual's qualifications, characteristics, or entitlements in a secure and privacy-preserving manner, which can be used to access telecommunications and residential broadband services.
Virtual Private Network (VPN) (): A Virtual Private Network (VPN) is a service that encrypts your internet connection and masks your online identity, allowing you to browse the web securely and privately.
VPN (Virtual Private Network) (): A VPN is a secure, encrypted connection that allows users to access the internet privately and safely, even when using public or untrusted networks.
W
Webcam security (): Webcam security refers to the measures taken to protect the privacy and integrity of webcams connected to a home network, preventing unauthorized access or misuse.
Wi-Fi Password (): A Wi-Fi password is a security key used to protect access to a wireless network, ensuring that only authorized users can connect to the network and use the internet connection.
Wi-Fi Protected Access (WPA) (): Wi-Fi Protected Access (WPA) is a security protocol designed to protect wireless networks and ensure secure communication between devices connected to a Wi-Fi network.
Wi-Fi Security (): Wi-Fi security refers to the measures and protocols used to protect wireless networks and the devices connected to them from unauthorized access, data theft, and other cyber threats.
Wireless Security Protocol (): A wireless security protocol is a set of rules and procedures designed to protect data transmitted over a wireless network, ensuring that only authorized users can access the network and the information it carries.
Z
Zero-Knowledge Encryption (): Zero-Knowledge Encryption is a security method that ensures your internet service provider (ISP) or other third parties cannot access or view your online activities, providing enhanced privacy and data protection.
Zero-Knowledge Proof (ZKP) (): A Zero-Knowledge Proof (ZKP) is a cryptographic technique that allows one party to prove to another that they possess certain information without revealing the information itself.