click below
click below
Normal Size Small Size show me how
FBI Cyber Safety
Term | Definition |
---|---|
Virus protection | preventing a program that infects files on your computer from infecting the computer by using special software and common sense |
Cyber bullying | using the internet to send or post messages or pictures that are meant to hurt or embarrass another person |
Netiquette | it means good computer and Internet manners |
Online predator | a person who uses the Internet to attempt to abuse or take advantage of kids |
Social networking | using a website that allows people to come together online to talk, make new friends, and share interests, photos, videos, links, ideas and more |
Privacy | the ability to control what info you reveal about yourself over the Internet and who can access that info |
Grooming | how a predator tries to gain the trust of a child in order to abuse or take advantage of them later |
Reputable Site | a website that contains trusted and reliable content from a respected source |
Reporting | telling a teacher, parent, or other adult about something you saw online that you didn’t think was appropriate |
Plagiarism | act of using another person’s words or ideas as your own without giving credit to that person |
Copyright | the legal right to copy, publish, sell or distribute an original piece of work, like a book, song or photograph |
https or a lock symbol | usually means a website is secure |
safest websites | usually end in .gov or .edu. |
Bluetooth | A way to connect electronic devices such as keyboards, mice, and headphones using wireless technology |
Cyberstalking | Using online technologies over and over to harass or scare someone |
Digital Distraction | Using electronic devices in an unsafe or unhealthy way so that you are not paying attention to the people or situation around you (for example, texting while riding a bicycle) |
Digital Footprint | Information about you that is left behind on the Internet after you go online and can be used by people and companies to track your Internet activities. |
File-Sharing Sites | Sites or services that let you share music, videos, and other files online with other people. Be careful—many of these sites contain copyrighted media. |
Firewall | A security tool that helps protect your computer by only allowing trusted connections |
IP Address | Short for Internet protocol address, a unique number that identifies a specific computer using the Internet |
Identity Theft | When someone steals your personal information, pretends to be you, and commits a crime in your name |
Internet History | A list of webpages you have visited online that is stored in your web browser. Deleting this on a regular basis makes it harder for companies to track you. |
Malware | Short for malicious software, it can damage or disable your electronic devices and steal your personal information |
Personal Information | Revealing details like your name, address, telephone number, and age that can be used by others to figure out who you are and where to find you |
Phishing | A tricky way of trying to steal your password and other sensitive information through electronic messages that appear to come from a site you trust |
Sexting | Texting sexually explicit pictures or videos to another person. |
Upstander | someone who supports and speaks up for a person being bullied online |
Web Browser | A computer application like Google Chrome, Mozilla Firefox, and Internet Explorer that lets you find and visit websites |
Troll | Someone who makes people online mad on purpose |
URL | the full address of a website |