Glossary of Cyber Security Terms
Essential Vocabulary for Navigating the World of Cyber Security
G
Gateway
A gateway is the diplomatic liaison in networking, connecting two networks with differing transmission protocols. A cyber concierge of sorts, it manages all data passage and communication in and out of the network.
Gethostbyaddr
A detective-type DNS query used when you know a machine's address, but need its name. Gethostbyaddr reveals the hidden identities of IP addresses.
Gethostbyname
This DNS query flips the script. You've got a machine's name but need its address? Gethostbyname steps in to provide the exact location you're looking for.
Gigabit Ethernet
Gigabit Ethernet is like the autobahn of Ethernet, supporting lightning-fast data transfer rates of 1 Gigabit (1,000 megabits) per second.
GNU
GNU is the open-source champion of operating systems. Birthed in 1983, it ushered in a wave of software freedom, offering modifiable and redistributable source code to the masses.
Gnutella
Think of Gnutella as the digital librarian of the internet, serving as both a server for file sharing and a client for searching and downloading files.
GPG (GNU Privacy Guard)
GPG is the vigilant guardian of your data, offering cryptographic services that adhere to RFC 4880, the current Open Standards specification of OpenPGP.
Graphical User Interface (GUI)
GUI revolutionizes how we interact with computers, offering a visually immersive experience complete with windows, icons, and menus. It's the face of modern operating systems.
Group Policy
An essential feature of the Microsoft Windows NT operating systems, Group Policy is the digital HR, managing the working environment of user and computer accounts.
GUID (Globally Unique Identifier)
Consider GUIDs as the unique fingerprints of the digital world. These 128-bit value identifiers are a unique reference number for computer systems, displayed as a string of hexadecimal digits.
Guard
A digital sentinel, a guard acts as a security system shielding one network from another. Information exchange occurs under its watchful eye and strict security controls.
Gzip
Gzip is the space-saver of the digital world. It's a software application and file format used to compress and decompress files, often deployed to shrink web pages for browser decompression.
Gateway Anti-Virus
This vigilant security feature scans network traffic for signs of malicious software. It stands guard at the gateway, keeping a sharp eye out for any hint of network-based malware.
Geolocation
Geolocation is the digital compass, pinpointing the real-world geographic location of a device, such as a mobile phone or an internet-connected computer.
Google Hacking
Google Hacking takes the art of finding specific strings of text within search results to a new level. This technique uses advanced operators in the Google search engine, yielding precise results.
Grayware (or Greyware)
Grayware is the digital fly in the ointment, comprising unwanted software that can disrupt systems. Although not viruses, these files and programs, including spyware and adware, can impede computer performance.
Greynet
These are the Jekyll and Hyde of applications. Installed with user consent, they can be manipulated negatively, causing potential harm to your system.
Grid Computing
Grid Computing assembles a virtual supercomputer from networked, loosely coupled computers to accomplish large tasks. Think of it as a digital symphony, working harmoniously towards a common goal.
Guarded System
Guarded systems enjoy the protection of a guard, enhancing their security posture against cyber threats.
GUI (Graphical User Interface)
GUIs are the touch-friendly, visually engaging user interfaces that have reshaped how we interact with digital devices. They utilize graphical icons and visual indicators, departing from text-based user interfaces and command labels.