A wide area network consisting of an international network of computer networks
Online service
A service provided via the Internet that allows users to access the service by using their PC and a router or modem
e.g. online shopping and banking
Card payment gateway systems
An online service used by auction, booking and shopping websites to allow customers to pay over the Internet. It involves computer networks and several operators to handle a large volume of calls
Worldwide web
A system of connected HTML documents accessed via the Internet using a web browser
Price comparison services
A website that gives a comparison of prices from different retailers together with a link to the retailer's website
Browse
To read and navigate through a series of web pages received from the Internet
Username
The identifier a user types into an ICT system in order to gain access to the system. Every user has a unique username so that authentication can be carried out.
Password
An authentication technique user to access a computer system. The user types in their username followed by their password which only they know. This method of security relies on the user never revealing their password to other users.
Hacker
An unauthorized user of computer systems
Identity fraud
The copying of the details of a person for illegal user by another. Copying details of a credit card onto another card is a common method.
Encrypted data
Data that has been changed into a meaningless collection of characters so that it can be transmitted securely.
Encryption key
The code that is used to change normal data into encrypted data.
Website
A collection of interrelated web pages that relate to one topic or organization and are usually accessible via the Internet
Domain name
Web server
The name given to both the hardware and software required for the hosting of websites. Large organizations often have their own web servers but small organizations tend to use a hosted web server.
Shopping cart software
Software used to create the representation of a shopping cart for customers to buy goods online
User interface
The method by which a computer interacts with a user. It normally consists of a specially designed screen that allows the user to input information as well as providing output to the user.
Phishing
A method of fraud where the user or customer is sent an e-mail purporting to be from the bank asking for their account details and passwords. On receipt of this information the fraudster is able to access the customer's account online and defraud that person.
Robots
A device often used in industrial applications to act independently, having been programmed to carry out a specific task.
Program
To create a set of instructions that will produce a required output from an ICT system
Systems Analyst
An individual who is responsible for the phases of the systems life cycle being carried out.
Design
A stage in the systems life cycle occurring after an existing system has been analyzed and before a new system is created
Implementation
The installing of a new ICT system to replace an existing system
Computer programmer
A person who writes software routines for use in various applications. They usually work in conjunction with a systems analyst who directs the requirements of a program
Help desk
Usually a telephone service, where the operators help people with their problems. It is used frequently to help with technical problems related to computers
Teleworking
A method of working that involves employees spending all or some of their working week at home, using their home as an office and making use of ICT to do so
Encryption
The process of creating encrypted data
Decrypt
To remove encryption from received data, thus enabling the user to understand what would otherwise be unintelligible.
Public-key
A type of encryption-key that is given out by a computer to enable other computers to encrypt data to send to it.
Transaction numbers (TANs)
A password that is used once only as a security method in online banking
Chip and PIN
A technology that is used in debit and credit cards for payment in stores or use with ATMs. The chip is read by a card reader machine and is compared with the number typed in by the customer. It helps to ensure security of transactions.
PIN
Personal Identification Number. Usually typed into a PIN reader when using a chip and PIN card.
SSL
Secure sockets layer. A network of protocol that is used for remotely accessing a computer or server using encryption security.
TLS
Transport layer security
Protocols
Sets of rules that governs how communication between two devices will occur.
Duty of confidence
The responsibility of an employee to the company they work for and the customers whose personal details they are dealing with to maintain the confidentiality of the data
Duty of fidelity
The responsibility of an employee to remain loyal to the company they work for as long as they are employed there. They should not pass on company secrets to other organizations.
Anonymised information
Personal details of an individual where the name or other identifying information is left out.
Aggregated information
Personal details of individuals combined to provide information without naming those individuals.
Skimming
A type of identity fraud where a card that is swiped legitimately in a retail outlet is swiped again on another machine that reads all the details from the card. This data is then transferred to a blank card for further use.
Pharming
A process whereby the user, typically a bank customer using online banking, of what appears to be a genuine website is redirected to a bogus website. The customer thinks they are dealing with their bank but actually sending their details to a fraudster's website.
Carpel tunnel syndrome
A medical condition causing pain in the forearm and wrist that can be caused by repetitive use of the keyboard
Cubital tunnel syndrome
A medical condition similar to carpel tunnel syndrome, but which occurs in the elbow and is most commonly caused by regularly making lengthy mobile phone calls
e.g. online shopping and banking