Glossary

Cloud

Someone else's computer.

See here.

https

An acronym for the “hypertext transfer protocol: secure”. Basically, it secures the connection between your web browser and the web server, to prevent a third party from observing your traffic.

For information on https for when you are browsing someone else's site, see here.

For information on configuring your own site to see https, see here.

GPG

An acronym for “Gnu Privacy Guard”. GPG is an open source implementation of the PGP encryption system.

Malware

Nasty stuff which can do bad things to your computer, such as spying on what you are doing, corrupting your data, or adding to your electricity bill by running unwanted programs.

Password manager

A piece of software designed to securely hold all your passwords, so that you do not need to keep them written down on sticky notes attached to your monitor.

See here.

PGP

An acronym for “Pretty Good Privacy”. PGP is an encryption system which some people love and some people hate. It's often used for encrypting email, but it can be used for other things too.

See here.

Phishing

A fraudulent email, designed to get you to share your personal data — usually your bank account details, or login credentials.

See here.

Tethering

Connecting to the Internet by attaching your phone to your computer, and using your mobile data plan.

See here.

Threat modelling

The act of working out what risks you face, to ensure that you approach cybersecurity proportionately.

See here.

Tor

An acronym for “The Onion Router”, Tor is a network designed to increase and protect a user's privacy and anonymity.

Virtual private network

A (usually secure) means of routing your traffic from your computer or phone to another computer.

See here.

VPN

An acronym for Virtual Private Network.