The glossary below contains many of the terms you will find in common use throughout our website. Please refer to this list to find definitions of terms and answers to other Internet security-related questions.


The policies, practices, and procedures that are applied to information systems to ensure that the data and information that is held within or communicated along those systems is not vulnerable to inappropriate or unauthorized use, access, or modification and that the networks that are used to store, process, or transmit information are kept operational and secure against unauthorized access.