- Application layer
- Backdoor
- BIOS
- Botnet
- Buffer
- Ciphertext
- Command line
- Content
- Cryptographic backdoor
- Cryptography
- Deep Packet Inspection
- Domain name system
- Downstream
- Encryption
- Facial recognition
- Federated Query Mechanism
- Feed
- Fibre-optic cable
- Five Eyes
- Forward Secrecy
- Friend-to-Friend
- Front-end
- Garlic routing
- Hypertext Transfer Protocol
- Internet backbone
- Link layer
- Malware
- Man-in-the-middle
- Man-on-the-side
- Metadata
- Mix network
- Network layer
- Onion routing
- Overlay network
- Packet injection
- Pattern-of-life analysis
- Peer-to-Peer
- Physical layer
- Plausible deniability
- Proxy
- Pseudo-top-level domain
- Relay network
- RST packet spoofing
- Sentiment analysis
- Social layer
- Standard
- Switch
- Transport layer
- Trojan
- Tunnel routing
- Upstream