Technology is constantly changing. And that means terminology used to talk about tech changes quickly, too. You may hear commonly used words and terms related to cybersecurity, but unless you really understand what they mean, it's easy to get confused. This confusion can lead to mistakes or gaps in both personal and device security.

For those not familiar with technology, especially seniors who may be less comfortable with today’s technology, the confusion and frustration can put their security at risk.

To help reduce the confusion, here are explanations of some commonly used terms to help you better secure your information and your devices.

Terms and Definitions

Choose the correct term for each definition below.

 

Tech Terms in Simple Terms
 

Authentication: The process of confirming you are really you. The most common types are username and password, one-time passcode and biometric features like an eye scan or fingerprint.

CAPTCHA: Words, characters or images used to confirm you are a human. It was designed to help prevent fraud on the internet and stands for “Completely Automated Public Turing test to tell Computers and Humans Apart.”

Catfishing: Someone pretending to be a different person online in the hope of getting something, most commonly money, from the people they fool.

Cloud: A remote location on the internet where you can store your files and data. The cloud allows you to access your data from multiple devices and provides a location to back up information, so it is not only on your device.

Dark Web: Internet sites that are not visible to common search engines, like Google and Bing, and may require a special browser or authorization to access are said to be on the dark web. Content on the dark web can be posted anonymously, which makes it attractive to bad guys trading illegal items or services.  

Encryption: Encryption translates data into unreadable code to keep that data private. Think of this as a secret code and only your device has the key to be able to read it.

Passphrase: Using a longer combination of words or a sentence to replace short, less secure passwords. Passphrases can also be easier to remember.

Phishing: An email that uses information familiar to you, like a friend’s name or company logo, to trick you into sharing personal information for fraudulent purposes.

PIN: A personal identification number with a variety of possible uses, including to access your bank’s ATM or unlock your cell phone. It is often a part of authentication methods to verify your identity.

eSIM or SIM (SIM Card): A small card or virtual chip in your phone that connects the phone to your carrier network, like AT&T, so you can receive calls, send text messages, and connect to the internet. SIM stands for “subscriber identity module.”

SMiShing: Similar to phishing except text messages are used instead of emails. (SMS – short message service – is the technical term for texting.) The message may include a phone number or link to a fake website that looks like a real company to get you to share your personal information.

Spoofing: Bad guys “hide” their phone number by making the number displayed on your phone look like a familiar or legitimate phone number, like from your area code and prefix. They do this to try to get you to answer the call so they can try to scam you.

The first step in security is education – knowing the risks and the ways you can better protect yourself.

To learn more about talking with older family members or friends about cybersecurity, check out these ways to empower tech caregivers to tackle online safety.

You can find more terms and definitions here.

HTML Editor Component
*Contents may not have visible height

Code snippet: Cyber Aware Custom CSS & JS

HTML Editor Component
*Contents may not have visible height