SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
Internet Safety Glossary of Terms

Adware:

A form of malicious software that displays unsolicited advertising on your computer.

Avatar:

A virtual and not necessarily accurate representation of a real person that is often used in chat rooms and
online communities to provide a visual representation of that person.

Back Door:

A way of accessing a computer system that circumvents the computer security measures.

Bit Torrent:

A content distribution protocol that enables the distribution, or "sharing" of software and data files,
including movies pictures, by enabling users to serve as redistribution points to other users of the
network. Pirated software and video content is often distributed through this channel.

Blog:

A diary or personal journal kept on a website. Blogs are short for weblogs and are usually updated
frequently and sometimes entries are grouped by specific subjects, such as politics, news, pop culture, or
computers. Readers often post comments in response to blog entries.

Cookie:

A small piece of computer data sent from a website to the web browser you are using (Chrome, Firefox,
Internet Explorer, Safari) which allows the website to identify you. The website will be able to then
recognize you as a return visitor for subsequent visits, and will be able to log you into the site. Cookies do
not provide websites any personal information about you. They do help the website gather wide spectrum
demographic information about you, including what time of day you logged in and from what city you are
accessing their site.

Cyber Grooming:

A process that online predators use to trick their victims by building false trust relationships.

Cyberbullying:

Cyberbullying "involves the use of information and communication technologies like the internet and
mobile phones to support deliberate, repeated, and hostile behavior by an individual or group, which is
intended to harm others."

Cyberstalking:

The use of online resources such as social media profiles, email, chat and instant messaging, for the
online enticement of children, delivery of rude, threatening, or harassing messages, or of repeated and
unwanted messages, or the sharing of slanderous information.

Encryption:

A process of securing information you send over the Internet. When sending emails, purchasing an item
online, or logging into your personal bank account via the Internet your Internet browser (Chrome,
Firefox, Internet Explorer, Safari) can "encrypt" the information you are sending by scrambling the
information so that it cannot be read by hackers. When accessing sites with sensitive information you
should look for a little padlock to appear in your browser. This lets you know that the site you're visiting is
using SSL - which means it is secure and is using encryption.

Flamer:

A very, and sometimes exceptionally, rude person mostly found in forums. These persons will use foul
language against others who might have misspelled a word or have a contrary opinion. Flamers will
usually go after new people or people who they know act badly.

Grooming:

This is the process predators use to befriend and manipulate minors into sexual relationships or into
producing sexual images of themselves. It often includes the giving of compliments or gifts.

Hacker:

A person who uses the Internet to break into a computer network or an individual’s computer for malicious
purposes.

Identity Theft:

Stealing someone’s personal information (e.g., credit card, social security number, bank account
numbers) and using it for illegal purposes such as making purchases, accessing bank accounts, applying
for credit cards, etc. Usually involves stealing money. E-mail scams, spyware, and viruses are the most
typical methods for stealing someone’s identity.

Imposter:

A person who pretends to be somebody else, for financial gain or other advantages using social media
sites. They attempt to deceive by using an assumed name or identity or other devious disguise.

Looping:

A website that will not allow you to exit it once you have navigated to it.

Lurker:

A lurker is a person who reads discussions on a message boards, newsgroups, chatrooms, file sharing or
other interactive system, but rarely or never participates actively.

Malware:

A malicious computer program that is meant to damage, destroy or corrupt information on a computer.
Viruses, worms, backdoors, and Trojan horses are examples of malware.

Mashup:

A web page or web site built automatically, whose content is a combination of materials from other
sources, typically RSS feeds and/or REST interfaces.

Mouse Trapping:

A commonly used technique by pornography sites where a user gets "locked" in a website. While surfing
the Internet it is possible to click a website and have multiple undesirable websites open. When this
happens, you often cannot close or back out of the sites and must close your Web browser completely.
Netiquette:

Netiquette is derived from the two words, internet and etiquette. Netiquette describes the rules for how
one should act online especially in newsgroups, forums and chat rooms. Netiquette can also be applied to
email and text message creation and transmission.

Netizen:

Derived from the term citizen, referring to a citizen of the Internet, or someone who uses networked
resources. The term connotes civic responsibility and participation.

Personal information:

Personal information is anything that can identify you, such as name, address, telephone number, mobile
number, age, what school or sports club you attend, your email address, password, username, bank
account or credit card details and who your family is.

Pharming:

An online scam that attacks the browser's address bar. Users type in what they think is a valid website
address and are unknowingly redirected to an illegitimate site that steals their personal information.

Phishing:

An online scam where imposters pose as real businesses and send emails instructing customers to visit
legitimate-looking sites and update their personal information. The scammers then steal the information
posted on the site and use it for illegal purposes. The best way to avoid phishing attacks is to not click
through any e-mails that you believe to be suspicious.

Predator:

Someone who stalks or uses lies, secrecy, stealth, or manipulation to befriend or get close to another
person with the intention to cause them harm, exploit them, or other forms of victimization.

Privacy:

The freedom from unauthorized intrusion or disturbance in one's private life or affairs. Being let alone and
able to keep certain personal matters to oneself.

Screen name:

Name / nickname used to identify oneself in communications on the Internet.

Screenshot:

An image of an active window on your computer that you can paste into a document.You make a screen
shot by holding down the <Cntrl> and <Alt> and then pressing <PrntScrn>, you can then paste it into a
document by holding down <Ctrl> then press <v>.

Sexting:

The creation and exchanging of sexual or provocative messages and/or photographs, often by teenagers,
between cellular phones, computers and other mobile devices, using the built-in camera.

Social Media Sites:
Internet based applications which are used to facilitate communication between users. These applications
include:

        Blogs and microblogs such as LiveJournal® and Twitter®
        E-mail programs such as Gmail™, Yahoo!Mail ®, and Hotmail®
        Picture and video sharing sites such as Flickr®, Photobucket®, and YouTube®
        Social networking sites such as Facebook®, MySpace®, and MyYearbook®
        Virtual worlds such as Club Penguin®, Habbo®, and Nicktropolis®

Spam:

Spam is the email equivalent of junk mail or nuisance phone calls. Spam can simply be defined as
unsolicited electronic email, instant messaging, SMS or MMS (text and image-based mobile phone
messaging) of a commercial nature which is sent to individuals/organizations that have not consented to
receive it.

Spoofing:

Another word that means the same thing as phishing. See definition for phishing.

Spyware:

A wide variety of software installed on people’s computers, which collects information about you without
your knowledge or consent and sends it back to whoever wrote the spyware program. The programs
typically will track computer use and create numerous pop-up ads. in some instances, the spyware can
damage the computer and facilitate identity theft.

Stalk:

To obsessively pursue a person from place to place on the Internet, attempting to find out their personal
information.

Stranger danger:

Stranger danger is the term used to describe the potential dangers in meeting a stranger online. Adults
may pretend to be children in chat rooms or other internet services. It is important for students to realize
they may not be communicating with the person they think they are.

Trojan Horse:

Is a destructive computer program that masquerades as a desirable or innocuous program. Trojan horses
allows thirds parties unauthorized access to computers, giving them the ability save files on the computer,
observe users’ activities or even to take control of the computer.

Troll:

A person who posts outrageous messages in a chatroom or a forum to bait people to answer. They delight
in sowing discord. Someone who inspires flaming rhetoric, someone who is purposely provoking and
pulling people into flaming discussion. Flaming discussions usually end with name calling and a flame war.

Urban Legend:

A humorous or horrific story or piece of information about a supposedly real event that spreads
spontaneously in various forms and is usually false.

Virus:
Computer programs which that typically arrive through e-mail attachments and can replicate themselves
and infect other computers unbeknownst to computer users. Viruses can cause programs to operate
incorrectly or corrupt files on a computer’s disk. Some viruses can spread across computer networks
rapidly using up all available computer memory.

Worm:

A program that replicates itself over a network, with malicious intentions, such as using up the computer
resources and harm networks by using up bandwidth. Unlike a virus, worms do not need to attach itself to
an existing program.

Sources:

http://curezone.com/forums/troll.asp

http://en.wikipedia.org/wiki/Cyberbully

http://en.wikipedia.org/wiki/Lurker

http://en.wikipedia.org/wiki/Troll_(Internet)

http://www.buysafe.com/security_center/security_glossary.html

http://www.cybersmart.gov.au/cyberquoll/html/glossary.html

http://www.decs.sa.gov.au/speced2/pages/cybersafety/36277/?reFlag=1

http://www.doe.virginia.gov/support/safety_crisis_management/internet_safety/glossary.pdf

http://www.hostindex.com/glossary.shtm#N

http://www.internetsafety101.org/glossaryofterms.htm

http://www.isafe.org/glossary.php

http://www.netnanny.com/learn_center/glossary

http://www.netsmartz.org/safety/definitions

http://www.netspark.com/?a=resources/glossary

http://www.parent-institute.com/internetsafety/glossary.pdf

http://www.slamtheonlinescam.com/glossary.php

http://www.urbandictionary.com/define.php?term=flamers

Más contenido relacionado

La actualidad más candente

Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9sajida zafar
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteJuan Miguel Palero
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & securityPriyab Satoshi
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide showBeckusq
 
E-Tech L13 ICT Project Publication and Statistics.pptx
E-Tech L13 ICT Project Publication and Statistics.pptxE-Tech L13 ICT Project Publication and Statistics.pptx
E-Tech L13 ICT Project Publication and Statistics.pptxLeah Condina
 
Module 2_ Cyber offenses & Cybercrime.pptx
Module 2_ Cyber offenses & Cybercrime.pptxModule 2_ Cyber offenses & Cybercrime.pptx
Module 2_ Cyber offenses & Cybercrime.pptxnikshaikh786
 
Emerging Technologies
Emerging TechnologiesEmerging Technologies
Emerging Technologiesrobin fay
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internetMaricrs Alfarö
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.Pratum
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx1SI19IS064TEJASS
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenesprimeteacher32
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacyvinyas87
 
Cyber threats
Cyber threatsCyber threats
Cyber threatskelsports
 
Basic requirements for internet connection
Basic requirements for internet connectionBasic requirements for internet connection
Basic requirements for internet connectioncolorsof
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 

La actualidad más candente (20)

Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide show
 
E-Tech L13 ICT Project Publication and Statistics.pptx
E-Tech L13 ICT Project Publication and Statistics.pptxE-Tech L13 ICT Project Publication and Statistics.pptx
E-Tech L13 ICT Project Publication and Statistics.pptx
 
Module 2_ Cyber offenses & Cybercrime.pptx
Module 2_ Cyber offenses & Cybercrime.pptxModule 2_ Cyber offenses & Cybercrime.pptx
Module 2_ Cyber offenses & Cybercrime.pptx
 
Information security
Information securityInformation security
Information security
 
Emerging Technologies
Emerging TechnologiesEmerging Technologies
Emerging Technologies
 
Security Threats at OSI layers
Security Threats at OSI layersSecurity Threats at OSI layers
Security Threats at OSI layers
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenes
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Basic requirements for internet connection
Basic requirements for internet connectionBasic requirements for internet connection
Basic requirements for internet connection
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 

Similar a Internet Safety Glossary of Terms

Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdfgaherwarsaloni1234
 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxjonadhe mondeja
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?FarjanaMitu3
 
Cyberspace
CyberspaceCyberspace
CyberspaceUtchi
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security9784
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber CrimeGaurav Patel
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Shumail Tariq
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptSukhdev48
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centurygracestearns
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centurygracestearns
 

Similar a Internet Safety Glossary of Terms (20)

Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdf
 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
My presentation
My presentationMy presentation
My presentation
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Computer crime
Computer crimeComputer crime
Computer crime
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_century
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_century
 
Module vi mis
Module vi misModule vi mis
Module vi mis
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 

Último

Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 

Último (20)

Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 

Internet Safety Glossary of Terms

  • 1. Internet Safety Glossary of Terms Adware: A form of malicious software that displays unsolicited advertising on your computer. Avatar: A virtual and not necessarily accurate representation of a real person that is often used in chat rooms and online communities to provide a visual representation of that person. Back Door: A way of accessing a computer system that circumvents the computer security measures. Bit Torrent: A content distribution protocol that enables the distribution, or "sharing" of software and data files, including movies pictures, by enabling users to serve as redistribution points to other users of the network. Pirated software and video content is often distributed through this channel. Blog: A diary or personal journal kept on a website. Blogs are short for weblogs and are usually updated frequently and sometimes entries are grouped by specific subjects, such as politics, news, pop culture, or computers. Readers often post comments in response to blog entries. Cookie: A small piece of computer data sent from a website to the web browser you are using (Chrome, Firefox, Internet Explorer, Safari) which allows the website to identify you. The website will be able to then recognize you as a return visitor for subsequent visits, and will be able to log you into the site. Cookies do not provide websites any personal information about you. They do help the website gather wide spectrum demographic information about you, including what time of day you logged in and from what city you are accessing their site. Cyber Grooming: A process that online predators use to trick their victims by building false trust relationships. Cyberbullying: Cyberbullying "involves the use of information and communication technologies like the internet and mobile phones to support deliberate, repeated, and hostile behavior by an individual or group, which is intended to harm others." Cyberstalking: The use of online resources such as social media profiles, email, chat and instant messaging, for the online enticement of children, delivery of rude, threatening, or harassing messages, or of repeated and unwanted messages, or the sharing of slanderous information. Encryption: A process of securing information you send over the Internet. When sending emails, purchasing an item online, or logging into your personal bank account via the Internet your Internet browser (Chrome, Firefox, Internet Explorer, Safari) can "encrypt" the information you are sending by scrambling the
  • 2. information so that it cannot be read by hackers. When accessing sites with sensitive information you should look for a little padlock to appear in your browser. This lets you know that the site you're visiting is using SSL - which means it is secure and is using encryption. Flamer: A very, and sometimes exceptionally, rude person mostly found in forums. These persons will use foul language against others who might have misspelled a word or have a contrary opinion. Flamers will usually go after new people or people who they know act badly. Grooming: This is the process predators use to befriend and manipulate minors into sexual relationships or into producing sexual images of themselves. It often includes the giving of compliments or gifts. Hacker: A person who uses the Internet to break into a computer network or an individual’s computer for malicious purposes. Identity Theft: Stealing someone’s personal information (e.g., credit card, social security number, bank account numbers) and using it for illegal purposes such as making purchases, accessing bank accounts, applying for credit cards, etc. Usually involves stealing money. E-mail scams, spyware, and viruses are the most typical methods for stealing someone’s identity. Imposter: A person who pretends to be somebody else, for financial gain or other advantages using social media sites. They attempt to deceive by using an assumed name or identity or other devious disguise. Looping: A website that will not allow you to exit it once you have navigated to it. Lurker: A lurker is a person who reads discussions on a message boards, newsgroups, chatrooms, file sharing or other interactive system, but rarely or never participates actively. Malware: A malicious computer program that is meant to damage, destroy or corrupt information on a computer. Viruses, worms, backdoors, and Trojan horses are examples of malware. Mashup: A web page or web site built automatically, whose content is a combination of materials from other sources, typically RSS feeds and/or REST interfaces. Mouse Trapping: A commonly used technique by pornography sites where a user gets "locked" in a website. While surfing the Internet it is possible to click a website and have multiple undesirable websites open. When this happens, you often cannot close or back out of the sites and must close your Web browser completely.
  • 3. Netiquette: Netiquette is derived from the two words, internet and etiquette. Netiquette describes the rules for how one should act online especially in newsgroups, forums and chat rooms. Netiquette can also be applied to email and text message creation and transmission. Netizen: Derived from the term citizen, referring to a citizen of the Internet, or someone who uses networked resources. The term connotes civic responsibility and participation. Personal information: Personal information is anything that can identify you, such as name, address, telephone number, mobile number, age, what school or sports club you attend, your email address, password, username, bank account or credit card details and who your family is. Pharming: An online scam that attacks the browser's address bar. Users type in what they think is a valid website address and are unknowingly redirected to an illegitimate site that steals their personal information. Phishing: An online scam where imposters pose as real businesses and send emails instructing customers to visit legitimate-looking sites and update their personal information. The scammers then steal the information posted on the site and use it for illegal purposes. The best way to avoid phishing attacks is to not click through any e-mails that you believe to be suspicious. Predator: Someone who stalks or uses lies, secrecy, stealth, or manipulation to befriend or get close to another person with the intention to cause them harm, exploit them, or other forms of victimization. Privacy: The freedom from unauthorized intrusion or disturbance in one's private life or affairs. Being let alone and able to keep certain personal matters to oneself. Screen name: Name / nickname used to identify oneself in communications on the Internet. Screenshot: An image of an active window on your computer that you can paste into a document.You make a screen shot by holding down the <Cntrl> and <Alt> and then pressing <PrntScrn>, you can then paste it into a document by holding down <Ctrl> then press <v>. Sexting: The creation and exchanging of sexual or provocative messages and/or photographs, often by teenagers, between cellular phones, computers and other mobile devices, using the built-in camera. Social Media Sites:
  • 4. Internet based applications which are used to facilitate communication between users. These applications include:  Blogs and microblogs such as LiveJournal® and Twitter®  E-mail programs such as Gmail™, Yahoo!Mail ®, and Hotmail®  Picture and video sharing sites such as Flickr®, Photobucket®, and YouTube®  Social networking sites such as Facebook®, MySpace®, and MyYearbook®  Virtual worlds such as Club Penguin®, Habbo®, and Nicktropolis® Spam: Spam is the email equivalent of junk mail or nuisance phone calls. Spam can simply be defined as unsolicited electronic email, instant messaging, SMS or MMS (text and image-based mobile phone messaging) of a commercial nature which is sent to individuals/organizations that have not consented to receive it. Spoofing: Another word that means the same thing as phishing. See definition for phishing. Spyware: A wide variety of software installed on people’s computers, which collects information about you without your knowledge or consent and sends it back to whoever wrote the spyware program. The programs typically will track computer use and create numerous pop-up ads. in some instances, the spyware can damage the computer and facilitate identity theft. Stalk: To obsessively pursue a person from place to place on the Internet, attempting to find out their personal information. Stranger danger: Stranger danger is the term used to describe the potential dangers in meeting a stranger online. Adults may pretend to be children in chat rooms or other internet services. It is important for students to realize they may not be communicating with the person they think they are. Trojan Horse: Is a destructive computer program that masquerades as a desirable or innocuous program. Trojan horses allows thirds parties unauthorized access to computers, giving them the ability save files on the computer, observe users’ activities or even to take control of the computer. Troll: A person who posts outrageous messages in a chatroom or a forum to bait people to answer. They delight in sowing discord. Someone who inspires flaming rhetoric, someone who is purposely provoking and pulling people into flaming discussion. Flaming discussions usually end with name calling and a flame war. Urban Legend: A humorous or horrific story or piece of information about a supposedly real event that spreads spontaneously in various forms and is usually false. Virus:
  • 5. Computer programs which that typically arrive through e-mail attachments and can replicate themselves and infect other computers unbeknownst to computer users. Viruses can cause programs to operate incorrectly or corrupt files on a computer’s disk. Some viruses can spread across computer networks rapidly using up all available computer memory. Worm: A program that replicates itself over a network, with malicious intentions, such as using up the computer resources and harm networks by using up bandwidth. Unlike a virus, worms do not need to attach itself to an existing program. Sources: http://curezone.com/forums/troll.asp http://en.wikipedia.org/wiki/Cyberbully http://en.wikipedia.org/wiki/Lurker http://en.wikipedia.org/wiki/Troll_(Internet) http://www.buysafe.com/security_center/security_glossary.html http://www.cybersmart.gov.au/cyberquoll/html/glossary.html http://www.decs.sa.gov.au/speced2/pages/cybersafety/36277/?reFlag=1 http://www.doe.virginia.gov/support/safety_crisis_management/internet_safety/glossary.pdf http://www.hostindex.com/glossary.shtm#N http://www.internetsafety101.org/glossaryofterms.htm http://www.isafe.org/glossary.php http://www.netnanny.com/learn_center/glossary http://www.netsmartz.org/safety/definitions http://www.netspark.com/?a=resources/glossary http://www.parent-institute.com/internetsafety/glossary.pdf http://www.slamtheonlinescam.com/glossary.php http://www.urbandictionary.com/define.php?term=flamers