ABCDEFGHIJKLMNOPQRSTUVWXYZ
1
termposcommenttranslation_rocomment_ro
2
accessNounAbility to enter, open.acces
3
access controlNounA security technique that regulates who or what can view or use resources in a computing environment.control de acces
4
accountNounAn identity created for a person or an organization in a computer or computing system.cont
5
account settingsNounThe settings associated with an authorized user's profile in a computer network.setările contului
6
application (app)NounA computer program designed to perform a group of coordinated functions, tasks, or activities for the benefit of the user.aplicație
7
approachNounA particular manner of taking specific steps in order to achieve something.realizare
8
attachmentNounFile sent together with an email or other electronic message.atașament
9
attackNounIn computer security, an attack is a method that can be used to compromise security, or its actual use. An attacker is the person or organization using an attack. An attack method is sometimes called an "exploit."atac
10
audio fileNounA sound file, or a file that plays a sound when clicked on.fișier audio
11
authoritiesNounPersons in command (e.g. government, police).autorități
12
awarenessNounKnowledge and understanding that something is happening or exists.conștientizare
13
backupNounCopy of data, updated regularly or not, in order to allow restoration in case of data loss. It can be stored locally, on the cloud or on a removable medium such as an optical disk or USB drive. This last option allows backups to be stored away safely.copie
14
best practiceNounA procedure that has been shown by research and experience to produce optimal results and that is established or proposed as a standard suitable for widespread adoption.bune practici
15
biometricsNounThe measurement and analysis of unique physical or behavioral characteristics (such as fingerprint or voice patterns) especially as a means of verifying personal identity.biometrice
16
bugVerbConceal a miniature microphone (in a room or device) in order to listen to or record someone's conversations secretly.a instala microfoane
17
buggedAdjectiveIf something is bugged, it has a secret microphone or camera planted in it for spying on people.supravegheat
18
built in functionNounA function that is already available in a programming language, application, or another tool that can be accessed by end users.funcșionalitate din fabrică
19
chat providerNounSomeone (usually a company) who provides services of online messaging. distribuitor de chat, distributori de mesagerie, provider de chat
20
communication platformNounA software application or set of tools that enables people to easily communicate with each other.platforme de comunicare
21
compromisedAdjectiveMade vulnerable (as to attack or misuse) by unauthorized access, revelation, or exposure.compromise
22
connecting dotsPhraseA way to log into a device by using a pattern to draw lines between dots.puncte de legătură
23
consNounAn argument or evidence against something.împotriva
24
dataNounInformation in digital form that can be transmitted or processed.dată
25
data systemNounA computer, electronic, telecommunications, or network system of any variety that stores some kind of information (e.g. databases, websites). It allows users to retrieve, manage, and analyze the information.sistem de date
26
deletion toolNounA software that removes documents, pictures, and other files used by programs on your device.instrument de ștergere
27
deviceNounA piece of electronic equipment such as smartphone, computer, external hard drive.device
28
device locatorNounA software that searches and finds your device based on the location of the device.soft de localizare
29
digital communicationNounThe use of online tools like email, social media messaging and texting to reach other individuals or a specific audience in order to share a message.comunicații digitale
30
digital deviceNounA piece of physical equipment that uses digital data.device digital
31
digital habitNounA behavioral pattern that is exhibited when an individual uses technology.obiceiuri digitale
32
digital safetyNounBeing aware of the nature of the possible threats that you could encounter whilst engaging in activity through the Internet. the act of staying safe online.siguranță digitală
33
digital securityNounRefers to protecting your computer, mobile devices, tablets, and any other Internet-connected devices from intruders, which could be in the form of hacking, phishing, and more. Digital security could also be used to protect your personal data from being used and sold by companies.securitate digitală
34
Digital Security Fellowship TTXNounName of the workshop.Digital Security Fellowship TTX - Training de securitate digitală
35
digital skillNounThe ability to find, evaluate, use, share, and create content using digital devices, such as computers and smartphones.competențe digitale
36
disappearing messagesNounA feature available in messaging apps that lets users set a default timer for messages to delete themselves.mesaje care dispar
37
domainNounA distinct subset of the internet with addresses sharing a common suffix or under the control of a particular organization or individual.domeniu
38
downloadVerbTo transfer (data, files, etc.) from one location (such as a large computer or the cloud) to another (such as a smaller computer, smartphone, or storage device).a descărca
39
doxxingVerbSearch for and publish private or identifying information about (a particular individual) on the internet, typically with malicious intent.
40
driveNounA computer component used to store data.drive
41
dry-runNounA practice exercise.

Synonyms: rehearsal, trial
încercare
42
emailNounA system of sending written messages electronically from one computer to another. Email is an abbreviation of 'electronic mail'.email
43
email domainNounThe web address that comes after the @ symbol in an email address.domeniu de email
44
encryptedAdjectiveEncodedcriptat
45
end-to-end encryptionNounEnd-to-end encryption ensures that a message is turned into a secret message by its original sender, and decoded only by its final recipient. Other forms of encryption may depend on encryption performed by third-parties. That means that those parties have to be trusted with the original text. End-to-end encryption is generally regarded as safer, because it reduces the number of parties who might be able to interfere or break the encryption.criptare end-to-end
46
etc.AbbreviationUsed at the end of a list to indicate that you have mentioned only some of the items involved and have not given a full list. etc is a written abbreviation for 'et cetera'.etc.
47
external hard driveNounA storage device located outside of a computer that is connected through a USB cable or wireless connection.hard extern
48
Facebook MessengerNounThis is the name of an instant messaging app. Do not translate.Facebook Massenger
49
fact-checkVerbTo verify the factual accuracy of something.verificat
50
fileNounA container in a computer system for storing information.document
51
file protectionNounPreventing accidental erasing of data.protejarea de documente
52
file sharingNounThe public or private sharing of files or folders on a computer connected to a network.partajare de documente
53
flip chartNounA board with large pieces of paper fixed to the top which can be turned over.flipchart
54
folderNounFolders help in storing and organizing files and data in the computer.folder
55
goalNounThe end toward which effort is directed.scop
56
Google DriveNounThis is the name of a file storage and synchronization service. Do not translate.Google Drive
57
ground rulesNounGuidelines that participants in a meeting agree to follow in order to make the meeting more productive and enjoyable.reguli de bază
58
hackNounAn act or instance of gaining or attempting to gain illegal access to a computer or computer system.atac
59
hackedAdjectiveTo gain illegal access to a computer network, system, etc.hackerit, spart
60
hard driveNounA storage device located inside of a computer.hard
61
installVerbTo make a program ready for execution and use.a instala
62
Internet connectionNounA connection provided by an Internet Service Provider that enables the exchange of data via Internet.conexiune de internet
63
INTERNEWSNounThis is the name of an organization. Do not translate.INTERNEWS
64
invasion vectorNounThe transfer mechanisms responsible for the introduction and spread of invasive species in a certain area. In the context of digital safety and security, this would refer to someone or something that might have been a factor in causing a digital attack or similar.vector invaziv
65
ITNounIT stands for 'Information Technology'. Information Technology is the study or use of systems (especially computers and telecommunications) for storing, retrieving, and sending information.IT
66
IT supportNounProfessionals that provide help to companies or individuals for technology products ranging from computers and phones to televisions and software. IT stands for 'Information Technology'.suport IT
67
key trackerNounA malicious program or device that records everything you type into a device, including passwords and other personal details, allowing others to secretly collect that information. (The "key" refers to the keys you have on your keyboard.) Key trackers are often malware that users have been tricked into downloading and running, or occasionally physical hardware secretly plugged into a keyboard or device.

Synonyms: keylogger
68
laptopNounA portable computer.laptop
69
leakNounAn intentional disclosure of something secret or private.scurgere (de informații)
70
leakVerbIntentionally disclose something secret or private.a se scurge (informații), a dezvălui informații
71
learning objectivesNounStatements that clearly describe what students are expected to achieve as a result of instruction.obiective de învățare
72
limited accessNounRestricted permission to view something.acces limitat
73
linkNounA digital reference to data that the user can follow or be guided to by clicking or tapping. A link (or hyperlink) points to a whole document or to a specific element within a document.link
74
log in, log intoVerbGo through the procedures to begin using a computer, database, or system.a se loga
75
MailvelopeNounThis is the name of an end-to-end encrypted email service. Do not translate.Mailvelope
76
MalwareNounSoftware that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.soft deunător, malware
77
memory cardNounA small, flat flash drive used especially in digital cameras and mobile phones for storing digital information.card de memorie
78
mobile deviceNounA piece of portable electronic equipment that can connect to the internet, especially a smartphone or tablet computer.device mobil
79
mobile phoneNounA portable telephone.telefon mobil
80
networkedAdjectiveWhen devices, such as computers, are connected together so that they can share information.introdus în rețea
81
newsroomNounA place (such as an office) where news is prepared for publication or broadcast.redacție de știri
82
offboardingNounThe process by which a company handles a departing employee. This process involves any number of steps to guarantee an amicable separation, a transfer of knowledge, and the securing of company property and data.
83
onboardingNounThe process in which newly hired employees are introduced and integrated into their new role at an organization.
84
onlineAdjectiveConnected to, served by, or available through a system and especially a computer or telecommunications system.online
85
online presenceNounThe collective existence of a business or an individual that is found online via searches.prezență online
86
organizational securityNounA set of rules, practices, and procedures imposed by an organization to address its security needs.securitate organizațională
87
passwordNounA string of characters used to verify the identity of a user during the authentication process.parolă
88
password managerNounA tool that can encrypt and store passwords using a single master password making it practical to use many different passwords on different sites and services without having to memorize them.

Synonyms: secure password database, password safe
manager de parole
89
password-protectVerbTo protect the contents of a file or device from being accessed until the correct password is entered.protejat prin parolă
90
permission systemNounDefines a set of access rights.
91
PGPNounPGP stands for 'Pretty Good Privacy'. It is a commercial software that enables users to communicate securely by decrypting and encrypting messages, authenticating messages through digital signatures, and encrypting files.PGP
92
phishingNounPhishing is a form of social engineering where attackers deceive people into revealing sensitive information or installing malware.phishing
93
policyNounA course or principle of action adopted or proposed by an organization or individual.politică de (...)
94
power cordNounA cord to conduct power to an electrical appliance.cablu de alimentare
95
powerpointNounPowerPoint is a software package designed to create electronic presentations consisting of a series of separate pages or slides. The presentations are often referred to as "a powerpoint".powerpoint
96
pressNounNews reporters, publishers, broadcasters, journalists.presă
97
prosNounAn argument or evidence in favor of something.pro, în favoarea, pentru
98
ProtonMailNounThis is the name of an end-to-end encrypted email service. Do not translate.ProtonMail
99
remoteAdjectiveUsing or involving a network connection between computers or systems in different locations.de la distanță
100
remote deletionNounA security feature that allows a network administrator or device owner to send a command that remotely deletes data from a computing device.

Synonyms: remote wipe
ștergere de la distanță