Cyber related terminology

File Transfer Protocol is designed for the transferring of files over the internet. files stored on an FTP server can be accessed using an FTP client such as a web browser or a command line interface.
World Wide Web the web consists of pages that can be accessed using a Web browser. The internet is the actual network of networks where all the information resides.
Generally taken to mean those who obtain unauthorised access to computers and internet services. (Some in the technical community would call this "cracking").
Incidents that could occur without computers, but may be assisted or carried out differently with the availability of computers
An incident that can only occur if a computer is involved: examples include hacking of computers.
Bulk sending of e-mails to users
A process whereby social engineering is used to trick an organisation or customer in to imparting confidential information, generally by persuading a victim to perform a series of actions which unwittingly provides the attacker with access.
Technology used to share files, such as music, images or movies between users.
Malicious software including computer viruses, worms, trojans and spyware.
Using multiple attacking computers to achieve the same effects as a Denial of Service attack.
A malicious attempt to distrupt the operation of a specific computer, network, website or other entity in cyber space.
A collection of computers infected with malicious bots which can be remotely controlled by the attacker.
Refers to an account on a computer (e.g. to log in to the device) or an account on an online service such as banking, social media or email.