click below
click below
Normal Size Small Size show me how
Cyber Safety
Cyber Ethics, Security, and Safety
| Term | Definition |
|---|---|
| Cyberbullying | Harassment, taunting, and teasing committed online, such as in chat rooms or by posting inappropriate or false information or images of someone |
| Hacking | Entering another user’s computer without permission and undertaking activities such as stealing personal information or crashing the system; the digital equivalent of breaking and entering |
| Plagiarism | Copying or using someone else’s work and taking credit for it without acknowledging the real author |
| Copyright | Copyright is a form of protection provided by the laws of the United States to the authors of “original works of authorship.” |
| Online gaming | video game played over some form of computer network |
| Social media | tools that allow people to create, share or exchange information, ideas, and pictures/videos in virtual communities and networks |
| Intellectual property | Property of the mind including ideas, inventions, and creations such as art and music |
| Identity theft | form of stealing someone’s identity |
| Antivirus | software program designed to identify and remove known or potential computer viruses |
| Firewall | Internet security software and/or hardware that protects your computer against unauthorized access |
| Malware | malicious software |
| Virus | Malicious software that enters a computer and negatively affects that computer’s ability to run correctly |
| Trojan horse | Computer program that appears to be a harmless or helpful application (such as a game) but actually causes damage to a computer once downloaded |
| Spam | unwanted e-mail usually sent in bulk |
| Spyware | Malicious software that enters a computer and tracks or gathers personal information on that computer without the knowledge of that computer’s user, often for marketing purposes. Spyware can also be responsible for pop-up ads and even identity theft. |
| Adware | software that is downloaded without the user's permission when they visit certain websites; usually in the form of advertisements |
| Phishing | Tricking users into revealing personal info. such as passwords and bank account numbers by way of emails pretending to be from actual companies; users are directed to a bogus Web site and asked to input sensitive info |
| PayPal | Third party vendor online that allows users to securely send and receive online payments via bank account or credit card |
| Virtual footprint | Info about yourself that you leave online through postings and photographs. Even if you delete something, it remains online in some capacity—don’t forget that every action you take online is permanent |