Commonly Used Terms

Cyber crime is rapidly evolving, as is the terminology used to describe it. The following are commonly used terms that relate to cyber crime.

Back door: A way to access an electronic system by bypassing some or all security mechanisms.

Blog: An online journal. Contraction of the term “web log.”

Bot: A software robot that performs automated tasks.

Browser: A program used to access the Internet. Commonly used browsers include Internet Explorer, Google Chrome, and Mozilla Firefox.

Cookie: An information packet sent from a website to a web browser that records a user’s activity on that website.

Cyber bullying: The act of one individual harassing or intimidating another individual via the Internet.

Denial-of-Service (DoS) attack: A coordinated attack that aims to overwhelm the resources of a targeted system to crash that system.

Domain name: A unique Internet identifier registered to an entity (e.g.

Email header: The opening section of an electronic message that provides information about the sender, recipients, subject, and the date and time a message was sent.

Firewall: Hardware and/or software designed to prevent unauthorized users from accessing a computer system.

Global Positioning System (GPS): A satellite navigation system that identifies the precise location of the transmitting device.

Hacktivism: A politically- or ideologically-motivated cyber attack or hack.

Internet Protocol (IP) address: A unique 32-bit binary number that identifies the computer or other host being used to access the Internet.

Internet Service Provider (ISP): A company that offers access to the Internet.

Login: A username and password used to identify an individual attempting to gain access to a restricted page or network.

Malware: Malicious software, such as a virus or a worm, that attacks a target computer.

Metadata: Amassed data that is used to describe large amounts of other Internet data.

Network: A group of computers that is linked to share data and other information.

Operating system: The overarching program that runs all the functions on a computer or other electronic device.

Password: A word, phrase, or collection of characters that must be entered correctly on a login page to access content in a restricted area. Administrators may require passwords be a certain length, include capital letters, numbers, or special characters, or be changed after a set length of time.

Phishing: Attempting to mimic an official email from a trusted organization to lure individuals into revealing login information or other personal information.

Search engine: A website that finds information across the Internet based on a set of search criteria.

Spam: Unsolicited advertising or other information sent out via email or other messaging service.

System administrator: An individual who manages and oversees a network.

Trojan: A program that masks something harmful, such as a worm or virus, that it carries into a device.

Webcam: A camera connected to a computer, generally used to then stream videos to the Internet.

Wireless hotspot: A location where individuals can connect to the Internet wirelessly. This may be in a larger area in a public space or a small space created by a cell phone.

For a complete list of cyber terms, see the Glossary.

IACP Conference