Skip to main content

Glossary

A B C D E F H I K M O P R S T U V W X All

An IT security tool connected to a network that mimics likely targets of cyber attacks (e.g. vulnerable networks) in order to attract attempted attacks. When cybercriminals gain access to these 'decoy' systems, security professionals can gather information about the method of intrusion, the purpose of the intrusion and the perpetrators, which helps to thwart attack attempts on real targets.

Any computer (personal computer, workstation, mainframe computer) or other device connected to a network.

A secure version of HTTP (Hypertext Transfer Protocol), which is the primary protocol used for transferring data between a web browser and a website. HTTPS (S = Secure) is encrypted to increase the security of data transfers. This is particularly important when users are transferring sensitive data, such as when entering credit card details when shopping online or logging into an email service or other online services.