Term
|
Definition
|
|
Term
|
Definition
"A form of malicious code that displays unsolicited advertising on your computer." |
|
|
Term
|
Definition
"Software that attempts to block malicious programs/code/software (called viruses or malware) from harming your computer." |
|
|
Term
|
Definition
Software that comes packaged with additional features that you probably don’t want or need. The term is often used to describe manufacturer software that comes pre-installed on your computer. |
|
|
Term
|
Definition
"A location online that allows multiple users to communicate electronically with each other in real time, as opposed to delayed time as with e-mail." |
|
|
Term
|
Definition
"A program that lets you find, see, and hear material on web pages. Popular browsers include safari, Microsoft inIernet Explorer, Firefox, and Google chrome." |
|
|
Term
|
Definition
"A piece of information about your visit to a website that some websites record automatically on your computer. By using a cookie, a website operator can determine a lot of information about you and your computer. cookies are not always bad. For example, a cookie remembers that you prefer aisle seats in the front of the plane. " |
|
|
Term
|
Definition
"Willful and repeated harm inflicted through the medium of electronic text, typically through e-mails or on websites (e.g., blogs, social networking sites)." |
|
|
Term
|
Definition
Any Internet-related illegal activity. |
|
|
Term
|
Definition
Any technique, software, etc., used to protect computers and prevent online crime. |
|
|
Term
|
Definition
Methods individuals use to track, lure, or harass another person online. |
|
|
Term
|
Definition
computers maintain a record of all website visits and e-mail messages, leaving a trail of the user’s activity in cyberspace. These data can still exist even after the browser history has been cleared and e-mail messages have been deleted. |
|
|
Term
|
Definition
A security system usually made up of hardware and software used to block hackers, viruses, and other malicious threats to your computer. |
|
|
Term
|
Definition
A hostile, strongly worded message that may contain obscene language. |
|
|
Term
|
Definition
Also called Internet forums, message boards, and bulletin boards. These are online sites that allow users to post comments on a particular issue. |
|
|
Term
|
Definition
Someone who uses code to change or modify an existing website. They can use their powers for good or evil. Crackers are much the same as hackers, except they are the bad guys who create malware and hack other people/computers/companies. |
|
|
Term
|
Definition
A term for the actual computer equipment and related machines or computer parts. |
|
|
Term
|
Definition
In this crime, someone obtains the vital information (e.g., credit card, social security number, bank account numbers) of another person, usually to steal money. E-mail scams, spyware, and viruses are among the most typical methods for stealing someone’s identity. |
|
|
Term
|
Definition
A giant collection of computer networks that connects people and information all over the world. |
|
|
Term
|
Definition
stands for malicious software or code, which includes any harmful code—trojans, worms, spyware, adware, etc.—that is designed to damage the computer or collect information. |
|
|
Term
|
Definition
Rules or manners for interacting courteously with others online (such as not typing a message in all capital letters, which is equivalent to shouting). |
|
|
Term
|
Definition
Trying to steal someone’s information via a spoof/fake website e.g. a fake PayPal site. |
|
|
Term
|
Definition
A type of online fraud, where someone tries to trick the victim into revealing sensitive details, such as a username, password, or credit card details by masquerading as a trustworthy entity in electronic communication. |
|
|
Term
|
Definition
A program, or set of instructions, that runs on a computer. |
|
|
Term
|
Definition
Named after the Greek myth, a Trojan horse often takes the shape of a useful program, but will cause damage if you run it. |
|
|
Term
|
Definition
A self-replicating software program that typically arrives through e-mail attachments and which multiplies on the hard drive, quickly exhausting the computer’s memory. A trojan is a variation that allows unauthorized users access to the computer, from which they can send infected e-mails or spam. |
|
|
Term
|
Definition
A type of malware that replicates (clones) itself so it can spread to other computers. They usually travel across a computer network and infect multiple computers. |
|
|
Term
|
Definition
The World Wide Web as accessed from mobile devices such as cell phones, PDAs, notebooks, and other portable gadgets connected to a public network. Access does not require a desktop computer. |
|
|
Term
|
Definition
A device installed in your computer or an external piece of hardware that connects your computer to the Internet through a phone or cable line and allows communication between computers. |
|
|
Term
|
Definition
Online communities, also known as social networks, where people share information about themselves, music files, photos, etc. There are many social networking websites (e.g., Twitter, LinkedIn, Tumblr, Pinterest, Instagram, Facebook, or Friendster). |
|
|
Term
Uniform Resource Locator (URL) |
|
Definition
The address of a site on the internet. For example, the uRL for the White house is: www.whitehouse.gov. Each URL is unique and there are millions of them. |
|
|
Term
|
Definition
"A program that lets you find, see, and hear material on web pages. Popular browsers include safari, Microsoft inIernet Explorer, Firefox, and Google chrome."
Glossary of Terms. (n.d.). Retrieved from https://internetsafety101.org/glossaryofterms. |
|
|
Term
|
Definition
"A piece of information about your visit to a website that some websites record automatically on your computer. By using a cookie, a website operator can determine a lot of information about you and your computer. cookies are not always bad. For example, a cookie remembers that you prefer aisle seats in the front of the plane. "
Glossary of Terms. (n.d.). Retrieved from https://internetsafety101.org/glossaryofterms. |
|
|
Term
|
Definition
"Willful and repeated harm inflicted through the medium of electronic text, typically through e-mails or on websites (e.g., blogs, social networking sites)."
Glossary of Terms. (n.d.). Retrieved from https://internetsafety101.org/glossaryofterms. |
|
|
Term
|
Definition
"Any Internet-related illegal activity."
Glossary of Terms. (n.d.). Retrieved from https://internetsafety101.org/glossaryofterms. |
|
|
Term
|
Definition
"Any technique, software, etc., used to protect computers and prevent online crime."
Glossary of Terms. (n.d.). Retrieved from https://internetsafety101.org/glossaryofterms. |
|
|
Term
|
Definition
"Methods individuals use to track, lure, or harass another person online."
Glossary of Terms. (n.d.). Retrieved from https://internetsafety101.org/glossaryofterms. |
|
|
Term
|
Definition
"computers maintain a record of all website visits and e-mail messages, leaving a trail of the user’s activity in cyberspace. These data can still exist even after the browser history has been cleared and e-mail messages have been deleted."
Glossary of Terms. (n.d.). Retrieved from https://internetsafety101.org/glossaryofterms. |
|
|
Term
|
Definition
"A form of malicious code that displays unsolicited advertising on your computer."
Glossary of Terms. (n.d.). Retrieved from https://internetsafety101.org/glossaryofterms. |
|
|
Term
|
Definition
"Software that attempts to block malicious programs/code/software (called viruses or malware) from harming your computer."
Glossary of Terms. (n.d.). Retrieved from https://internetsafety101.org/glossaryofterms. |
|
|
Term
|
Definition
"Software that comes packaged with additional features that you probably don’t want or need. The term is often used to describe manufacturer software that comes pre-installed on your computer."
Cody, B. (2017, February 1). The beginner's guide to internet safety: A glossary [Blog]. Retrieved May 31, 2019, from https://uk.norton.com/norton-blog/2017/02/the_beginners_guide.html. |
|
|
Term
|
Definition
"A location online that allows multiple users to communicate electronically with each other in real time, as opposed to delayed time as with e-mail."
Glossary of Terms. (n.d.). Retrieved from https://internetsafety101.org/glossaryofterms. |
|
|