Cyberspace - An environment in which digitized information is distributed on networks of computers.
Cybersecurity - Measures taken to protect computers or critical infrastructure, although some experts
suggest that it is about protecting everything of value.
Cyber warfare - Using computers and the Internet to attack others via their computer systems. Targets
may include military computer networks, power grids, banks, and government and media Web sites.
Most often the goal is to disrupt the functioning of the target system.
Cyber warriors - Military specialists, law enforcement officials, computer forensics experts and civil
engineers who defend national and economic security assets.
Denial-of-service attack - Flooding the networks or servers of individuals or organizations with false
data requests so they are unable to respond to requests from legitimate users.
Development Corridors: Study conducted by Ministry of Planning and Economic Affairs (MPEA) to
pinpoint areas of economic growth opportunities for Liberia under the different sectors of the economy.
Dominant Service Provider: operator(s) designated to have significant market power or otherwise to
be dominant in one or more telecommunications service markets pursuant to the Telecommunications
ACT of 2007. Major Telecommunications Systems Provider or licensee with 51% of market share in a
particular service type shall be declared by the Commission in its publication to be a dominant service
provider.
ECOWAS: Economics Community of West African States.
Encryption - A method of protecting information by transforming it using a cipher so only those who
have the key can read it.
Fiber Optics: The technique of transmitting light through long, thin, flexible glass fibers, plastic or
other transparent materials.
Fixed Service: Service of radio or other communication conducted between specified fixed points.
Gateway: A point of entrance and exit to another system, such as the connection point between a local
area network and an external communication network (WAN, Internet, etc.).
GSM: Global System for Mobile Communications is the most popular standard for mobile
telecommunications technology used widely in most continents.
Hacker - A person with special expertise in computer systems and software. A hacker who attempts to
gain
unauthorized
access
to
computer
systems
is
a
"cracker."
Hacktivist - An individual who breaches Web sites or secured communications systems to deliver
political messages, including those related to foreign policy, or propaganda. It has been described by
Naval Postgraduate School Professor Dorothy Denning as "the marriage of hacking and activism."
Identity management - A method of validating a person's identity when he/she tries to access a network.
Incident management - Executing a defensive response when a network's security is threatened.
Interconnection Agreement: Agreement between interconnect provider and an interconnect operator in
relation to the interconnection of their telecommunication systems.
ICT: Information and Communications Technology.

45

Select target paragraph3