A Virtual LAN. Partitions a physical network into separate virtual networks for improved management and security.

Quality of Service. Prioritizes certain types of network traffic, like voice or video, for a smoother experience.

Malware that spreads by copying itself, like a biological virus. Evolved into more advanced forms:

Watching a video or listening to audio in “real-time”, as it’s sent to you, rather than downloading first.

Malware disguised as legitimate software. Named after the famed Trojan Horse.

Catch-all term for malicious software like viruses, spyware, and ransomware. Only download from trusted sources.

Unsolicited bulk messages, usually email. Most inboxes filter spam out automatically.

Tricking people into revealing sensitive info by posing as a trusted entity. Be wary of emails asking you to log in or download attachments.

A Virtual Private Network. Encrypts your internet traffic and masks your IP address for better privacy.

Options to control how your data is collected and used. Review them in your OS, browser, and apps.