A | B |
Cyberbullying | use of computers, cell phones or other electronic devices to deliberately and repeatedly harm another person through the Internet |
Online Predator | adult Internet user who uses social networking sites, chat rooms or other cyberspace to approach and eventually hurt other people, usually for sexual or other abusive purposes |
Sexting | creation, distribution or forwarding of a message which includes sexually explicit materials through a computer, cell phone or other electronic device |
Computer Virus | computer program which replicates and spreads itself from one computer to another |
Botnet | collection of computers controlled by users other than their owners to perform automated tasks over the Internet |
Social Engineering Vector | method through which hackers can gain access to a computer |
Hacker | originally refers to someone who is an expert at computer programming and who is able to solve computer problems, but also means someone who illegally gains access to others’ computer for their own profits |
Identity Theft | crime which occurs when someone’s personal and financial information is stolen in order to impersonate him or her for financial gain |
E-mail Scam | fraud which involves stealing personal information for financial gain through e-mail |
Router | computer device which forwards data packets from one network to another |
Network Switch | network controller which connects network devices and allows effective communication between these devices |
Firewall | software designed to protect computers from viruses |
Intrusion Detection System | device which monitors network activities for malicious attacks and produces reports to a management station |
Virtual Private Network | security component which encrypts data and keeps it private within a public network |
Intellectual Property | ownership of any creative work or invention |
Copyright | granted legal right which gives the creator of an original work exclusive rights to reproduce, publish, sell or distribute his or her production |
Piracy | unauthorized reproduction or distribution of copyrighted materials, information or production |
Fair Use | exception to copyright infringement |
Plagiarism | use of other people’s words, thoughts or ideas without crediting the source |
Session cookies | Temporary cookies and will only be stored in the memory of the browser while it is open |
Persistent cookies | Utilized over a much longer period and are tagged with an expiration date by the issuer |
First-party cookies | Created by the domain a web user is visiting and helps a website carry out common functions |
Third-party cookies | Created by a site a user is not currently visiting and is commonly used to track a user who has clicked on an advertisement creating a link between the user and the domain which is referred to them |