Glossary

Explore our Glossary of common terms in the analytics, product, and growth space. Learn their definitions and view examples.

A

B

  • An automated software application that executes specific tasks over the internet without human intervention.

  • The suite of technologies and methodologies designed to identify and mitigate automated bot traffic while allowing legitimate human users to access online services.

  • A network of compromised computers or devices controlled by a malicious actor, often used for malicious activities such as DDoS attacks, spam distribution, and data theft.

C

  • A challenge-response test used on websites to verify that a user is human and not an automated bot.

  • The deliberate manipulation of digital advertising metrics through automated scripts or human labor that generate fake clicks, impressions, or engagements to deplete ad budgets or inflate revenue.

  • The principle of clearly disclosing all costs and pricing information to users without hidden fees.

  • An attack where bots try stolen username/password pairs from one breach across multiple websites.

  • The practice of protecting systems, networks, and programs from digital attacks, ensuring confidentiality, integrity, and availability of information.

D

  • A privacy principle that advocates collecting, processing, and storing only the minimum amount of personal data necessary to fulfill a specific purpose.

  • A cyber attack that floods a network, server, or website with excessive traffic to overwhelm it and deny service to legitimate users.

  • A system design approach that distributes data and processing across multiple nodes or locations, enhancing security, privacy, and resilience.

  • A CAPTCHA system that adapts its challenges based on user behavior and context, enhancing security and user experience.

G

  • The General Data Protection Regulation (GDPR) is a comprehensive data protection law in the European Union that governs how personal data is collected, processed, and stored.

N

  • The practice of protecting computer networks from unauthorized access, misuse, or theft, ensuring the confidentiality, integrity, and availability of data.

P

  • Any data that can be used to identify an individual, either directly or indirectly.

  • A system design approach that prioritizes user privacy by integrating data protection principles into the core technical foundation of products and services.

  • A privacy-first CAPTCHA solution that uses advanced machine learning techniques to provide secure and user-friendly verification.

R

  • A Google service that uses advanced risk analysis techniques to differentiate between human users and bots, often through interactive challenges.

  • A numerical value assigned to a user or entity based on their behavior and interactions, used to assess the likelihood of malicious activity.

U

  • The process of collecting and analyzing data on how users interact with a website or application to improve user experience, security, and performance.

  • The overall experience a user has while interacting with a website or application, encompassing usability, accessibility, and satisfaction.

W

  • The automated extraction of data from websites using bots or scripts to collect information for analysis, monitoring, or reuse.

  • The practice of protecting websites and web applications from cyber threats, ensuring the confidentiality, integrity, and availability of data.

Ready to ditch Google reCAPTCHA?
Start for free today. No credit card required.