Introduction
Below is a blank glossary template organized alphabetically from A to Z. This table is populated with Terms related to websites, web hosting, URLs, the internet, Cybersecurity and Programming Languages.
This table helps to understand the terminology associated with website hosting services and is crucial for anyone looking to host a website. This glossary provides definitions for the most commonly used terms in web hosting to help you navigate the world of online hosting more effectively.
It cover definitions relating to all things Cybersecurity and cover programming language definitions as well.
Letter | Term | Definition |
---|---|---|
A | ||
B | ||
Bandwidth |
The amount of data that can be transferred between users and a website over the internet in a given time period. |
|
C | ||
Cryptocurrency | A digital form of money used for transactions on the World Wide Web. | |
Cybersecurity | An advanced from of Networks used to protect a website or web application using either dedicated hardware or software tools. | |
cPanel |
A popular web-based control panel that allows users to manage their website hosting accounts |
|
D | ||
Domain Name | The human-readable address used to access a website (e.g., www.fmssltd.co.uk) | |
DNS (Domain Name System) | A system that translates domain names into IP addresses, allowing browsers to load websites. | |
Dedicated Hosting | A hosting solution where a website has its own server, offering greater control and resources. | |
DDoS (Distributed Denial of Service) |
A cyberattack where multiple systems overwhelm a server, causing the website or service to go offline. |
|
E | ||
Encryption |
The process of converting information or data into a code to prevent unauthorised access. |
|
F | ||
Firewall |
A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. |
|
G | ||
H | ||
I | ||
Internet Security | ||
IP Address |
A unique string of numbers assigned to every device on a network to identify its location. |
|
J | Joomla | A content management system for a website. |
K | ||
L | ||
M | ||
Malware |
Malicious software designed to damage or gain unauthorized access to computer systems. |
|
N | ||
O | ||
P | ||
Pentesting | A way to attack a website looking for vulnerabilities. | |
Phishing |
A type of cyberattack where attackers trick users into providing sensitive information (e.g., passwords, credit card details) by impersonating a trustworthy entity. |
|
Q | ||
R | ||
Ransomware |
A type of malware that encrypts the victim’s data and demands payment (ransom) to restore access. |
|
S | ||
SEO | Search Engine Optimization a technique used to improve a web page for a better ranking on a search engine. | |
Shared Hosting | A web hosting environment where multiple websites are hosted on a single server. | |
SSL (Secure Sockets Layer) | A security protocol that encrypts data transferred between a website and its visitors. | |
T | ||
Two-Factor Authentication (2FA) |
A security process that requires users to provide two forms of identification before accessing an account. |
|
U | ||
USB Cable | ||
Uptime |
The percentage of time a website is available and accessible online. |
|
V | ||
VPS (Virtual Private Server) |
A type of hosting that provides a virtualized server environment, offering more control than shared hosting. |
|
VPN (Virtual Private Network |
A tool that allows users to securely connect to the internet through an encrypted tunnel, protecting their online activity. |
|
W | ||
Website | A place on the web. | |
Webhosting | A provider giving hosting to a website. | |
Webpage | A contents page within a website. | |
X | ||
Y | ||
Z | ||
Zero-day Exploit |
A cyberattack that occurs on the same day a software vulnerability is discovered before a patch is available. |
|