Your SlideShare is downloading. ×
Internet Safety Glossary of Terms
Internet Safety Glossary of Terms
Internet Safety Glossary of Terms
Internet Safety Glossary of Terms
Internet Safety Glossary of Terms
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Internet Safety Glossary of Terms


Published on

EDET-J722 Internet Safety Project Glossary of Terms

EDET-J722 Internet Safety Project Glossary of Terms

Published in: Education, Technology
1 Like
  • Be the first to comment

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. Internet Safety Glossary of TermsAdware:A form of malicious software that displays unsolicited advertising on your computer.Avatar:A virtual and not necessarily accurate representation of a real person that is often used in chat rooms andonline communities to provide a visual representation of that person.Back Door:A way of accessing a computer system that circumvents the computer security measures.Bit Torrent:A content distribution protocol that enables the distribution, or "sharing" of software and data files,including movies pictures, by enabling users to serve as redistribution points to other users of thenetwork. Pirated software and video content is often distributed through this channel.Blog:A diary or personal journal kept on a website. Blogs are short for weblogs and are usually updatedfrequently and sometimes entries are grouped by specific subjects, such as politics, news, pop culture, orcomputers. Readers often post comments in response to blog entries.Cookie:A small piece of computer data sent from a website to the web browser you are using (Chrome, Firefox,Internet Explorer, Safari) which allows the website to identify you. The website will be able to thenrecognize you as a return visitor for subsequent visits, and will be able to log you into the site. Cookies donot provide websites any personal information about you. They do help the website gather wide spectrumdemographic information about you, including what time of day you logged in and from what city you areaccessing their site.Cyber Grooming:A process that online predators use to trick their victims by building false trust relationships.Cyberbullying:Cyberbullying "involves the use of information and communication technologies like the internet andmobile phones to support deliberate, repeated, and hostile behavior by an individual or group, which isintended to harm others."Cyberstalking:The use of online resources such as social media profiles, email, chat and instant messaging, for theonline enticement of children, delivery of rude, threatening, or harassing messages, or of repeated andunwanted messages, or the sharing of slanderous information.Encryption:A process of securing information you send over the Internet. When sending emails, purchasing an itemonline, or logging into your personal bank account via the Internet your Internet browser (Chrome,Firefox, Internet Explorer, Safari) can "encrypt" the information you are sending by scrambling the
  • 2. information so that it cannot be read by hackers. When accessing sites with sensitive information youshould look for a little padlock to appear in your browser. This lets you know that the site youre visiting isusing SSL - which means it is secure and is using encryption.Flamer:A very, and sometimes exceptionally, rude person mostly found in forums. These persons will use foullanguage against others who might have misspelled a word or have a contrary opinion. Flamers willusually go after new people or people who they know act badly.Grooming:This is the process predators use to befriend and manipulate minors into sexual relationships or intoproducing sexual images of themselves. It often includes the giving of compliments or gifts.Hacker:A person who uses the Internet to break into a computer network or an individual’s computer for maliciouspurposes.Identity Theft:Stealing someone’s personal information (e.g., credit card, social security number, bank accountnumbers) and using it for illegal purposes such as making purchases, accessing bank accounts, applyingfor credit cards, etc. Usually involves stealing money. E-mail scams, spyware, and viruses are the mosttypical methods for stealing someone’s identity.Imposter:A person who pretends to be somebody else, for financial gain or other advantages using social mediasites. They attempt to deceive by using an assumed name or identity or other devious disguise.Looping:A website that will not allow you to exit it once you have navigated to it.Lurker:A lurker is a person who reads discussions on a message boards, newsgroups, chatrooms, file sharing orother interactive system, but rarely or never participates actively.Malware:A malicious computer program that is meant to damage, destroy or corrupt information on a computer.Viruses, worms, backdoors, and Trojan horses are examples of malware.Mashup:A web page or web site built automatically, whose content is a combination of materials from othersources, typically RSS feeds and/or REST interfaces.Mouse Trapping:A commonly used technique by pornography sites where a user gets "locked" in a website. While surfingthe Internet it is possible to click a website and have multiple undesirable websites open. When thishappens, you often cannot close or back out of the sites and must close your Web browser completely.
  • 3. Netiquette:Netiquette is derived from the two words, internet and etiquette. Netiquette describes the rules for howone should act online especially in newsgroups, forums and chat rooms. Netiquette can also be applied toemail and text message creation and transmission.Netizen:Derived from the term citizen, referring to a citizen of the Internet, or someone who uses networkedresources. The term connotes civic responsibility and participation.Personal information:Personal information is anything that can identify you, such as name, address, telephone number, mobilenumber, age, what school or sports club you attend, your email address, password, username, bankaccount or credit card details and who your family is.Pharming:An online scam that attacks the browsers address bar. Users type in what they think is a valid websiteaddress and are unknowingly redirected to an illegitimate site that steals their personal information.Phishing:An online scam where imposters pose as real businesses and send emails instructing customers to visitlegitimate-looking sites and update their personal information. The scammers then steal the informationposted on the site and use it for illegal purposes. The best way to avoid phishing attacks is to not clickthrough any e-mails that you believe to be suspicious.Predator:Someone who stalks or uses lies, secrecy, stealth, or manipulation to befriend or get close to anotherperson with the intention to cause them harm, exploit them, or other forms of victimization.Privacy:The freedom from unauthorized intrusion or disturbance in ones private life or affairs. Being let alone andable to keep certain personal matters to oneself.Screen name:Name / nickname used to identify oneself in communications on the Internet.Screenshot:An image of an active window on your computer that you can paste into a document.You make a screenshot by holding down the <Cntrl> and <Alt> and then pressing <PrntScrn>, you can then paste it into adocument by holding down <Ctrl> then press <v>.Sexting:The creation and exchanging of sexual or provocative messages and/or photographs, often by teenagers,between cellular phones, computers and other mobile devices, using the built-in camera.Social Media Sites:
  • 4. Internet based applications which are used to facilitate communication between users. These applicationsinclude:  Blogs and microblogs such as LiveJournal® and Twitter®  E-mail programs such as Gmail™, Yahoo!Mail ®, and Hotmail®  Picture and video sharing sites such as Flickr®, Photobucket®, and YouTube®  Social networking sites such as Facebook®, MySpace®, and MyYearbook®  Virtual worlds such as Club Penguin®, Habbo®, and Nicktropolis®Spam:Spam is the email equivalent of junk mail or nuisance phone calls. Spam can simply be defined asunsolicited electronic email, instant messaging, SMS or MMS (text and image-based mobile phonemessaging) of a commercial nature which is sent to individuals/organizations that have not consented toreceive it.Spoofing:Another word that means the same thing as phishing. See definition for phishing.Spyware:A wide variety of software installed on people’s computers, which collects information about you withoutyour knowledge or consent and sends it back to whoever wrote the spyware program. The programstypically will track computer use and create numerous pop-up ads. in some instances, the spyware candamage the computer and facilitate identity theft.Stalk:To obsessively pursue a person from place to place on the Internet, attempting to find out their personalinformation.Stranger danger:Stranger danger is the term used to describe the potential dangers in meeting a stranger online. Adultsmay pretend to be children in chat rooms or other internet services. It is important for students to realizethey may not be communicating with the person they think they are.Trojan Horse:Is a destructive computer program that masquerades as a desirable or innocuous program. Trojan horsesallows thirds parties unauthorized access to computers, giving them the ability save files on the computer,observe users’ activities or even to take control of the computer.Troll:A person who posts outrageous messages in a chatroom or a forum to bait people to answer. They delightin sowing discord. Someone who inspires flaming rhetoric, someone who is purposely provoking andpulling people into flaming discussion. Flaming discussions usually end with name calling and a flame war.Urban Legend:A humorous or horrific story or piece of information about a supposedly real event that spreadsspontaneously in various forms and is usually false.Virus:
  • 5. Computer programs which that typically arrive through e-mail attachments and can replicate themselvesand infect other computers unbeknownst to computer users. Viruses can cause programs to operateincorrectly or corrupt files on a computer’s disk. Some viruses can spread across computer networksrapidly using up all available computer memory.Worm:A program that replicates itself over a network, with malicious intentions, such as using up the computerresources and harm networks by using up bandwidth. Unlike a virus, worms do not need to attach itself toan existing program.Sources: