Explore our Glossary of common terms in the analytics, product, and growth space. Learn their definitions and view examples.
When an attacker gains unauthorized control of a legitimate user's account.
The use of technology to perform tasks with minimal human intervention, often improving efficiency, accuracy, and scalability.
An automated software application that executes specific tasks over the internet without human intervention.
Techniques and processes used to identify and block automated software agents interacting with websites or applications.
The suite of technologies and methodologies designed to identify and mitigate automated bot traffic while allowing legitimate human users to access online services.
A network of compromised computers or devices controlled by a malicious actor, often used for malicious activities such as DDoS attacks, spam distribution, and data theft.
A challenge-response test used on websites to verify that a user is human and not an automated bot.
A service or operation that solves large volumes of CAPTCHAs, often using human labor or automated tools.
A tool, service, or algorithm designed to solve CAPTCHAs, either manually or automatically.
The deliberate manipulation of digital advertising metrics through automated scripts or human labor that generate fake clicks, impressions, or engagements to deplete ad budgets or inflate revenue.
The principle of clearly disclosing all costs and pricing information to users without hidden fees.
An attack where bots try stolen username/password pairs from one breach across multiple websites.
The practice of protecting systems, networks, and programs from digital attacks, ensuring confidentiality, integrity, and availability of information.
A privacy principle that advocates collecting, processing, and storing only the minimum amount of personal data necessary to fulfill a specific purpose.
A cyber attack that floods a network, server, or website with excessive traffic to overwhelm it and deny service to legitimate users.
A system design approach that distributes data and processing across multiple nodes or locations, enhancing security, privacy, and resilience.
The Domain Name System translates human-readable domain names into IP addresses used by computers to identify each other on the network.
A CAPTCHA system that adapts its challenges based on user behavior and context, enhancing security and user experience.
The General Data Protection Regulation (GDPR) is a comprehensive data protection law in the European Union that governs how personal data is collected, processed, and stored.
A fingerprinting technique that analyzes the structure of TLS and HTTP headers to identify clients beyond user agent strings.
The practice of protecting computer networks from unauthorized access, misuse, or theft, ensuring the confidentiality, integrity, and availability of data.
Any data that can be used to identify an individual, either directly or indirectly.
A system design approach that prioritizes user privacy by integrating data protection principles into the core technical foundation of products and services.
A privacy-first CAPTCHA solution that uses advanced machine learning techniques to provide secure and user-friendly verification.
An intermediary server or service that forwards requests between clients and other servers, often used for privacy, security, or caching.
A Google service that uses advanced risk analysis techniques to differentiate between human users and bots, often through interactive challenges.
A proxy that routes internet traffic through real residential IP addresses, making requests appear as if they originate from actual homes.
A numerical value assigned to a user or entity based on their behavior and interactions, used to assess the likelihood of malicious activity.
Transport Layer Security (TLS) is a cryptographic protocol that secures communication over computer networks.
A string sent by browsers or other clients to identify themselves and their capabilities to web servers.
The process of collecting and analyzing data on how users interact with a website or application to improve user experience, security, and performance.
The overall experience a user has while interacting with a website or application, encompassing usability, accessibility, and satisfaction.
The automated extraction of data from websites using bots or scripts to collect information for analysis, monitoring, or reuse.
The practice of protecting websites and web applications from cyber threats, ensuring the confidentiality, integrity, and availability of data.