vocabulary
Vocabulary Lab
High-value C1 vocabulary with pronunciation, collocations and examples.
45 minC1c1vocabularycybersecurity-privacy-digital-rightsciberseguridadprivacidaddatosseguridad
Lesson objectives
- Learn advanced lexical items related to cybersecurity, privacy & digital rights.
- Reuse collocations and pronunciation cues more accurately.
- Transfer high-value vocabulary into speaking and writing tasks.
Vocabulario C1 — Cybersecurity, Privacy & Digital Rights
30 palabras con definición, traducción, ejemplo y audio.
vulnerability //
/ˌvʌlnərəˈbɪləti/nDefinition:A weakness in a system that can be exploited by a threat actor.
Traducción:vulnerabilidad
Example:The recent software update was designed to patch a critical vulnerability in the cloud infrastructure.
Collocation:exploit a vulnerability
mitigate //
/ˈmɪtɪɡeɪt/vDefinition:To make something less severe, serious, or painful.
Traducción:mitigar
Example:Companies must implement multi-factor authentication to mitigate the risk of identity theft.
Collocation:mitigate the risk
unprecedented //
/ʌnˈpresɪdentɪd/adjDefinition:Never done or known before.
Traducción:sin precedentes
Example:The scale of the data breach was unprecedented, affecting over a billion users globally.
Collocation:unprecedented scale
pervasive //
/pəˈveɪsɪv/adjDefinition:Spreading widely throughout an area or a group of people.
Traducción:omnipresente / generalizado
Example:The pervasive nature of surveillance technology raises significant ethical concerns.
Collocation:pervasive influence
scrutinise //
/ˈskruːtənaɪz/vDefinition:To examine something very carefully in order to discover possible mistakes or illegal aspects.
Traducción:escrutar / examinar minuciosamente
Example:Regulators will scrutinise how AI algorithms process sensitive personal data.
Collocation:scrutinise the details
compromise //
/ˈkɒmprəmaɪz/vDefinition:To cause something to become vulnerable or exposed to danger.
Traducción:comprometer
Example:If your password is weak, your entire digital identity could be compromised.
Collocation:compromise security
breach //
/briːtʃ/nDefinition:An act of breaking a law, promise, or agreement.
Traducción:brecha / violación
Example:A major data breach has exposed the private records of thousands of employees.
Collocation:data breach
integrity //
/ɪnˈteɡrəti/nDefinition:The quality of being honest and having strong moral principles; in tech, the state of being whole and undivided.
Traducción:integridad
Example:Ensuring data integrity is vital to prevent malicious actors from altering financial records.
Collocation:maintain integrity
encryption //
/ɪnˈkrɪpʃn/nDefinition:The process of converting information or data into a code, especially to prevent unauthorized access.
Traducción:cifrado / encriptación
Example:End-to-end encryption ensures that only the sender and receiver can read the messages.
Collocation:strong encryption
asymmetric //
/ˌeɪsɪˈmetrɪk/adjDefinition:Having parts or aspects that are unequal or different on each side.
Traducción:asimétrico
Example:Asymmetric encryption uses two different keys to secure data transmission.
Collocation:asymmetric cryptography
compliance //
/kəmˈplaɪəns/nDefinition:The action or fact of complying with a law, most important rule, or regulation.
Traducción:cumplimiento
Example:The legal department is ensuring full compliance with the new digital privacy laws.
Collocation:regulatory compliance
infrastructure //
/ˈɪnfrəstrʌktʃə/nDefinition:The basic physical and organisational structures needed for the operation of a society or enterprise.
Traducción:infraestructura
Example:Cyberattacks on national infrastructure can have devastating real-world consequences.
Collocation:critical infrastructure
protocol //
/ˈprəʊtəkɒl/nDefinition:A system of rules that explain the correct procedures to be followed in a particular situation.
Traducción:protocolo
Example:The new security protocol requires biometric verification for all remote logins.
Collocation:security protocol
stringent //
/ˈstrɪndʒənt/adjDefinition:Strict, precise, and exacting.
Traducción:estricto / riguroso
Example:The government has introduced more stringent regulations regarding AI-driven surveillance.
Collocation:stringent regulations
accountability //
/əˌkaʊntəˈbɪləti/nDefinition:The fact or condition of being accountable; responsibility.
Traducción:rendición de cuentas / responsabilidad
Example:There must be greater accountability for tech giants regarding user data privacy.
Collocation:ensure accountability
impersonate //
/ˌɪmpəˈsəneɪt/vDefinition:To pretend to be another person for fraudulent purposes.
Traducción:suplantar la identidad
Example:Hackers often use phishing emails to impersonate bank officials.
Collocation:impersonate someone
authentication //
/ɔːˌθentɪˈkeɪʃn/nDefinition:The process of proving that something is true or that a person is who they claim to be.
Traducción:autenticación
Example:Two-factor authentication is now a standard requirement for most professional accounts.
Collocation:multi-factor authentication
unauthorized //
/ʌnˈɔːθəraɪzd/adjDefinition:Not having official permission.
Traducción:no autorizado
Example:The system logs every instance of unauthorized access attempts.
Collocation:unauthorized access
robust //
/rəʊˈbʌst/adjDefinition:Strong and unlikely to break or fail.
Traducción:robusto / sólido
Example:We need to develop a more robust firewall to protect our internal network.
Collocation:robust security
oversight //
/ˈəʊvəsaɪt/nDefinition:The action of overseeing something; supervision.
Traducción:supervisión
Example:Legislative oversight is necessary to prevent the misuse of facial recognition technology.
Collocation:regulatory oversight
phishing //
/ˈfɪʃɪŋ/nDefinition:The fraudulent practice of sending emails to induce individuals to reveal personal information.
Traducción:phishing / suplantación de identidad
Example:The company held a workshop to train staff on how to spot a phishing attempt.
Collocation:phishing scam
malicious //
/məˈlɪʃəs/adjDefinition:Intending or intended to do harm.
Traducción:malicioso
Example:Malicious software was detected attempting to bypass the company's security layers.
Collocation:malicious intent
algorithm //
/ˈælɡərɪðəm/nDefinition:A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
Traducción:algoritmo
Example:Bias in the algorithm could lead to discriminatory outcomes in automated hiring.
Collocation:complex algorithm
anonymity //
/ˌænəˈnɪməti/nDefinition:The condition of being anonymous.
Traducción:anonimato
Example:The internet allows for a level of anonymity that can be both liberating and dangerous.
Collocation:guarantee anonymity
vulnerable //
/ˈvʌlnərəbl/adjDefinition:Susceptible to physical or emotional attack or harm.
Traducción:vulnerable
Example:Elderly users are often more vulnerable to online scams.
Collocation:highly vulnerable
leak //
/liːk/vDefinition:To cause information to become known unofficially or accidentally.
Traducción:filtrar
Example:The whistleblower threatened to leak documents regarding the company's data practices.
Collocation:data leak
suspend //
/səˈspend/vDefinition:To temporarily prevent from continuing or being in force.
Traducción:suspender
Example:The user's account was suspended immediately after the suspicious activity was detected.
Collocation:suspend an account
scam //
/skæm/nDefinition:A dishonest scheme; a fraud.
Traducción:estafa
Example:Be careful of those 'get rich quick' ads; they are almost certainly a scam.
Collocation:sophisticated scam
hack //
/hæk/vDefinition:To gain unauthorized access to data in a system or computer.
Traducción:hackear
Example:They managed to hack into the central database through an unsecured IoT device.
Collocation:hack a system
creepy //
/ˈkriːpi/adjDefinition:Causing an unpleasant feeling of fear or unease (informal/conversational).
Traducción:inquietante / de dar miedo
Example:It's a bit creepy how much these apps know about our private lives.
Collocation:creepy feeling