• Internet: A global network of interconnected computer networks that communicate using standardized protocols.
• World Wide Web (WWW): A system of interlinked hypertext documents and multimedia accessed via the Internet.
• Uniform Resource Locator (URL): A text-based address used to locate resources on the Internet.
• Hypertext Transfer Protocol (HTTP): The foundational protocol used to transfer data between web servers and clients.
• Hypertext Transfer Protocol Secure (HTTPS): An extension of HTTP that encrypts data for secure communication over the Internet.
• Web browser: Software that retrieves, renders, and displays web pages from the Internet.
• Hypertext Markup Language (HTML): The standard language used to create and structure content on web pages.
• Domain Name System (DNS): A hierarchical system that translates human-readable domain names into IP addresses.
• IP address: A unique numerical identifier assigned to each device connected to a computer network.
• Transmission Control Protocol (TCP): A core network protocol that ensures reliable, ordered delivery of data between applications.
• Internet Protocol (IP): The primary protocol for sending data packets across networks by addressing and routing them.
• Cache: A temporary storage area for web data to speed up subsequent access to frequently used information.
• Cookies (including session cookies and persistent cookies): Small data files stored on a user's computer by websites to remember user information and preferences, with session cookies being temporary and persistent cookies lasting beyond a single session.
• Domain host, domain name, domain type, and country code: Components of a URL where the domain host (e.g., www) precedes the domain name, the domain type (e.g., .com, .org) categorizes the website, and the country code (e.g., .uk, .de) indicates its geographic or regional association.
• Digital currency: A form of money that exists only in digital form and is used for online transactions.
• Fiat currency: Government-issued money that is not backed by a physical commodity but by the government that issued it.
• Cryptocurrency: A digital or virtual currency that uses cryptography for secure transactions and operates independently of a central authority.
• Blockchain (and blockchaining): A decentralized ledger technology that records transactions across a network of computers in linked blocks.
• Hash value: A unique fixed-size string generated by a hash function that represents data, often used to ensure data integrity.
• Proof-of-work: A consensus mechanism that requires computational effort to validate transactions and add new blocks to a blockchain.
• Miners: Participants in a blockchain network who solve complex computational puzzles to validate transactions and secure the network in exchange for rewards.
• Cyber security: The practice of protecting computer systems, networks, and data from digital attacks or unauthorized access.
• Brute force attacks: A method used by attackers to gain unauthorized access by systematically trying all possible combinations of passwords or keys.
• Data interception: The unauthorized capture or eavesdropping on data as it is transmitted over a network.
• Distributed Denial of Service (DDoS) attacks: Coordinated attacks where multiple compromised systems flood a target with traffic to overwhelm its resources and disrupt services.
• Hacking: The unauthorized access or manipulation of computer systems or networks, often for malicious purposes.
• Malware: Malicious software designed to harm, exploit, or otherwise compromise computer systems or data.
– Viruses: Malicious code that attaches itself to programs and spreads by infecting files, often damaging data or disrupting system operations.
– Worms: Self-replicating malware that spreads across networks without needing to attach to existing programs.
– Trojan horse: Malicious software disguised as legitimate software that, once executed, can cause harm or provide unauthorized access.
– Spyware (including key logging): Software that secretly monitors and collects user activity and information, often including keystrokes.
– Adware: Software that automatically displays or downloads advertising material, sometimes compromising system performance or user privacy.
– Ransomware: Malware that encrypts a victim's data and demands payment for the decryption key to restore access.
• Phishing: A cyber attack that uses fraudulent emails or messages to trick users into revealing sensitive information.
• Pharming: A technique that redirects a user’s traffic from a legitimate website to a fraudulent one to steal sensitive data.
• Social engineering: Manipulative tactics used by cybercriminals to deceive individuals into divulging confidential information or performing actions that compromise security.
• Packet sniffer: A tool that intercepts and logs traffic passing over a digital network, often used to analyze or capture data.
• Encryption and decryption: The processes of converting data into a secure format (encryption) and reverting it back to its original form (decryption) using a key.
• Firewall: A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
• Proxy server: An intermediary server that separates end users from the websites they browse, providing anonymity and filtering web traffic.
• Anti-malware (including anti-virus and anti-spyware): Software designed to detect, prevent, and remove malicious software from computer systems.
• Authentication: The process of verifying the identity of a user or system before granting access to resources.
– Passwords, usernames, and PIN codes: Secret credentials used to verify a user’s identity and secure access to systems or accounts.
– Two-step verification: A security process that requires two forms of identification to confirm a user’s identity during login.
• Biometrics: Methods that use unique physical or behavioral characteristics to verify a person’s identity.
– Fingerprint scans (including capacitance fingerprint readers): Biometric systems that use the unique patterns of a person’s fingerprints for identification.
– Retina scans: Biometric systems that identify individuals by scanning the unique pattern of blood vessels in the retina.
– Face recognition: Biometric technology that identifies or verifies a person by analyzing facial features.
– Voice recognition: A biometric system that authenticates a person based on the unique characteristics of their voice.
• Secure Sockets Layer (SSL) and Transport Layer Security (TLS): Cryptographic protocols that provide secure communication over a computer network by encrypting data transmitted between a client and a server.
• Automatic software updates: The process by which software applications are regularly updated and patched automatically to enhance security and performance.
• Email filters and intrusion-detection software: Tools designed to detect, block, or alert users about unwanted, malicious, or suspicious emails and network activities.
• Internet
English: A global network of interconnected computer networks that communicate using standardized protocols.
中文:互联网是使用标准化协议互联的全球计算机网络系统.
• World Wide Web (WWW)
English: A system of interlinked hypertext documents and multimedia accessed via the Internet.
中文:万维网是通过互联网访问的一组互联的超文本文件和多媒体内容.
• Uniform Resource Locator (URL)
English: A text-based address used to locate resources on the Internet.
中文:统一资源定位符是一种用于在互联网上定位资源的文本地址.
• Hypertext Transfer Protocol (HTTP)
English: The foundational protocol used to transfer data between web servers and clients.
中文:超文本传输协议是用于在网络服务器与客户端之间传输数据的基础协议.
• Hypertext Transfer Protocol Secure (HTTPS)
English: An extension of HTTP that encrypts data for secure communication over the Internet.
中文:超文本传输安全协议是HTTP的扩展,通过加密数据实现互联网安全通信.
• Web browser
English: Software that retrieves, renders, and displays web pages from the Internet.
中文:网页浏览器是一种用于从互联网上检索、解析并显示网页的软件.
• Hypertext Markup Language (HTML)
English: The standard language used to create and structure content on web pages.
中文:超文本标记语言是用于创建和组织网页内容的标准语言.
• Domain Name System (DNS)
English: A hierarchical system that translates human-readable domain names into IP addresses.
中文:域名系统是一个分层系统,将人类可读的域名转换为IP地址.
• IP address
English: A unique numerical identifier assigned to each device connected to a computer network.
中文:IP地址是分配给每个连接到计算机网络的设备的唯一数字标识符.
• Transmission Control Protocol (TCP)
English: A core protocol that ensures reliable, ordered delivery of data between applications.
中文:传输控制协议是一种核心协议,确保应用程序之间数据的可靠、有序传输.
• Internet Protocol (IP)
English: The primary protocol for addressing and routing data packets across networks.
中文:互联网协议是用于为数据包分配地址并在网络中进行路由的主要协议.
• Cache
English: A temporary storage area that speeds up access to frequently used data.
中文:缓存是一个临时存储区域,用于加快对常用数据的访问速度.
• Cookies (including session cookies and persistent cookies)
English: Small data files stored on a user's device by websites to remember information and preferences, with session cookies lasting only for a browsing session and persistent cookies remaining longer.
中文:Cookie是网站在用户设备上存储的小数据文件,用于记住信息和偏好,其中会话Cookie仅在浏览期间有效,而持久Cookie保存时间更长.
• Domain host, domain name, domain type, and country code
English: The components of a URL where the domain host (e.g., www) precedes the domain name, the domain type (e.g., .com, .org) categorizes the site, and the country code (e.g., .uk, .de) indicates geographic association.
中文:域主机、域名、域类型和国家代码是URL的组成部分,其中域主机(如www)位于域名前,域类型(如.com、.org)标识网站类别,国家代码(如.uk、.de)表示其地域归属.
• Digital currency
English: A form of money that exists only in digital form and is used for online transactions.
中文:数字货币是一种仅以数字形式存在、用于在线交易的货币.
• Fiat currency
English: Government-issued money that is not backed by a physical commodity but by the authority of the issuing government.
中文:法定货币是由政府发行的货币,其价值不以实物商品为支撑,而是依赖于发行政府的信誉.
• Cryptocurrency
English: A digital or virtual currency that uses cryptography for secure transactions and operates independently of a central authority.
中文:加密货币是一种利用密码学实现安全交易且不依赖中央机构运作的数字或虚拟货币.
• Blockchain (and blockchaining)
English: A decentralized ledger technology that records transactions in linked blocks across a network.
中文:区块链是一种去中心化的账本技术,通过将交易记录在相互链接的区块中来运作.
• Hash value
English: A fixed-size string generated by a hash function that uniquely represents data.
中文:哈希值是由哈希函数生成的固定长度字符串,用于唯一地表示数据.
• Proof-of-work
English: A consensus mechanism that requires computational effort to validate transactions and add new blocks to a blockchain.
中文:工作量证明是一种共识机制,需要计算资源来验证交易并将新区块添加到区块链中.
• Miners
English: Participants in a blockchain network who validate transactions and secure the network by solving complex puzzles, earning rewards in return.
中文:矿工是在区块链网络中通过解决复杂问题验证交易和保障网络安全的参与者,并因此获得奖励.
• Cyber security
English: The practice of protecting computer systems, networks, and data from digital attacks and unauthorized access.
中文:网络安全是保护计算机系统、网络和数据免受数字攻击及未经授权访问的实践.
• Brute force attacks
English: Methods where attackers systematically try all possible combinations to crack passwords or encryption keys.
中文:暴力破解攻击是指攻击者系统地尝试所有可能的组合来破解密码或加密密钥.
• Data interception
English: The unauthorized capture or eavesdropping of data as it travels across a network.
中文:数据截获是指在数据通过网络传输过程中被未经授权捕获或窃听.
• Distributed Denial of Service (DDoS) attacks
English: Coordinated attacks where multiple systems overwhelm a target with traffic, disrupting its services.
中文:分布式拒绝服务攻击是指多个系统协同向目标发送大量流量,导致服务中断的攻击方式.
• Hacking
English: The act of gaining unauthorized access to computer systems or networks, often with malicious intent.
中文:黑客行为是指未经授权访问计算机系统或网络,通常带有恶意目的.
• Malware
English: Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems.
中文:恶意软件是一种旨在破坏、干扰或未经授权访问计算机系统的恶意程序.
– Viruses
English: Malicious code that attaches itself to legitimate programs and replicates to infect and damage files.
中文:病毒是附着在合法程序上的恶意代码,通过复制感染并破坏文件.
– Worms
English: Self-replicating malware that spreads across networks without needing to attach to other programs.
中文:蠕虫是一种无需附着在其他程序上即可自我复制并在网络中传播的恶意软件.
– Trojan horse
English: Malware disguised as legitimate software that, when executed, can cause harm or provide unauthorized access.
中文:特洛伊木马是一种伪装成合法软件的恶意程序,一旦运行便可能造成损害或提供未经授权的访问.
– Spyware (including key logging)
English: Software that covertly monitors and collects information about user activities, often including keystroke logging.
中文:间谍软件是一种秘密监控和收集用户活动信息的软件,通常包括记录按键行为.
– Adware
English: Software that automatically displays unwanted advertisements, potentially compromising user privacy.
中文:广告软件是一种自动显示不需要广告的软件,有时可能侵犯用户隐私.
– Ransomware
English: Malware that encrypts a victim’s data and demands payment to provide the decryption key.
中文:勒索软件是一种加密受害者数据并要求支付赎金以获取解密密钥的恶意程序.
• Phishing
English: A cyber attack method that uses fraudulent emails or messages to trick users into revealing sensitive information.
中文:网络钓鱼是一种通过欺诈性电子邮件或消息诱使用户泄露敏感信息的网络攻击方式.
• Pharming
English: A technique that redirects users from legitimate websites to fraudulent ones to steal personal data.
中文:域名劫持是一种将用户从合法网站重定向到伪造网站以窃取个人数据的技术.
• Social engineering
English: The use of psychological manipulation to trick individuals into divulging confidential information or compromising security.
中文:社会工程学是利用心理操纵欺骗个人泄露机密信息或破坏安全的一种方法.
• Packet sniffer
English: A tool that captures and analyzes data packets as they travel through a network.
中文:数据包嗅探器是一种捕获并分析在网络中传输的数据包的工具.
• Encryption and decryption
English: The processes of converting data into a secure, unreadable format (encryption) and reverting it back to its original form (decryption) using a key.
中文:加密和解密是将数据转换为安全、不可读格式(加密)以及利用密钥将其还原为原始形式(解密)的过程.
• Firewall
English: A security system that monitors and controls incoming and outgoing network traffic based on preset rules.
中文:防火墙是一种根据预设规则监控和控制进出网络流量的安全系统.
• Proxy server
English: An intermediary server that forwards client requests to web servers, providing anonymity and content filtering.
中文:代理服务器是一种中介服务器,将客户端请求转发至网络服务器,同时提供匿名性和内容过滤.
• Anti-malware (including anti-virus and anti-spyware)
English: Software designed to detect, prevent, and remove malicious software from computer systems.
中文:反恶意软件是用于检测、防止和清除计算机系统中恶意程序的软件(包括反病毒和反间谍软件).
• Authentication
English: The process of verifying a user’s or device’s identity before granting access to resources.
中文:认证是指在授予访问权限之前验证用户或设备身份的过程.
– Passwords, usernames, and PIN codes
English: Secret credentials used to verify a user's identity and secure access to systems or accounts.
中文:密码、用户名和个人识别码是用于验证用户身份并保护系统或账户访问的秘密凭证.
– Two-step verification
English: A security process that requires two separate forms of identification to confirm a user’s identity during login.
中文:双步验证是一种安全措施,在登录时需要两种不同的身份验证方式以确认用户身份.
• Biometrics
English: Methods that use unique physical or behavioral characteristics to verify an individual's identity.
中文:生物识别技术利用独特的生理或行为特征来验证个人身份.
– Fingerprint scans (including capacitance fingerprint readers)
English: Biometric systems that identify individuals by analyzing the unique patterns in their fingerprints.
中文:指纹扫描是通过分析个人指纹的独特图案来进行身份识别的生物识别系统(包括电容式指纹读取器).
– Retina scans
English: Biometric systems that verify identity by scanning the unique pattern of blood vessels in the retina.
中文:视网膜扫描是通过扫描视网膜中血管的独特图案来验证身份的生物识别系统.
– Face recognition
English: A biometric technology that identifies or verifies individuals by analyzing facial features.
中文:人脸识别是一种通过分析面部特征来识别或验证个人身份的生物识别技术.
– Voice recognition
English: A biometric system that uses the unique characteristics of a person’s voice for identification.
中文:语音识别是一种利用个人声音独特特征进行身份验证的生物识别系统.
• Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
English: Cryptographic protocols that secure data transmission by encrypting information exchanged between a client and a server.
中文:安全套接层(SSL)和传输层安全(TLS)是通过加密客户端与服务器之间交换的信息来保障数据传输安全的密码协议.
• Automatic software updates
English: A process by which software applications are regularly updated and patched automatically to improve security and functionality.
中文:自动软件更新是指软件应用程序定期自动更新和修补以提高安全性和功能性的过程.
• Email filters and intrusion-detection software
English: Tools that analyze incoming emails and network traffic to block, alert, or prevent suspicious or malicious activities.
中文:电子邮件过滤器和入侵检测软件是用于分析传入邮件和网络流量,从而阻止、警告或防止可疑或恶意活动的工具.