| A | B |
| Anonymous | When someone keeps their identity secret so that their actions can't be tied to them. |
| Blackmail | When someone forces a target to do something by saying they'll reveal information that the target wants to keep private. |
| Catfishing | When a person uses an online persona to gain the trust of someone else. |
| Cyberstalking | Messaging, commenting, or talking to someone digitally in a way that's threatening or stressful. |
| Denigration | Making someone look bad by spreading rumors or gossip. |
| Doctored | Photos and videos that have been edited to look real. They will often change what a person is doing, place their face on someone else's body, or even add them to a place they never were |
| Flaming | Posting or sending insults and offensive comments. |
| Hate Speech | Insults or harsh words that target someone based on a part of their identity, such as religion or race. |
| Impersonation | Pretending to be someone you aren't online in order to hurt someone else. |
| Outing or Doxing | Revealing private information about someone else online. |
| Trolling | Attempting to start arguments online. |
| Contact Information | A way to get help from a website if something happens. |
| Cyberbullying | Rude actions online that could include calling someone names, spreading rumors, or posting things without permission. |
| Identity Theft | When a criminal pretends to be someone else and opens bank accounts or claims things in another person's name. This can cost the victim a lot of time and money to fix. |
| Malware | Software that damages a device or steals information. |
| Misinformation | Information that isn't true, often created to trick |
| Privacy Policy | A document that says what a company will do with your information (name, email address, etc.) when they get it. |
| Ransomeware | Malware that locks up a system or certain files until the victim pay money. |
| Sensitive Information | Information that could be dangerous for others to know such as someone's full name, address, or account numbers. |
| Spyware | Malware that watches and records information from a device. |
| Virus | Malware that spreads throughout a device and damages it. |
| Cookies | Small packets of information that websites store on your computer to keep track of how you interacted with the site. |
| Digital Footprints | The trail of information about us that we leave online. This includes the websites we visit, personal information, and our online behavior. It can heavily impact how others view us. |
| Invisible audience | The hundreds of people who are paying attention to your online behavior. These can be strangers, friends, or people evalutaing you for employment. |
| IP Address | A number that's assigned to your computer when accessing online content. It can be used to identify your online activity. |
| Login Information | Everything that's used to verify online accounts. This includes passwords, associated email addresses, secret questions, and more. |
| Digital Wellness | A part of health that is impacted by technology. Strong digital wellness means a healthy relationship with technology. |
| Catfish | A person who uses a fake online persona to gain the trust of someone else. |
| Malware | Software designed to gain unauthorized access to and disrupt or damage a computer system. |
| Phishing | When a scammer impersonates or claims to represent a legitimate company online in order to trick you into giving your information or steal your money. |
| Ransomware | Malicious software that blocks access to a phone or computer system until a sum of money is paid. |
| Remote Access | The ability to control your device through another phone or computer. It usually requires downloading some kind of app or software. |
| Security Breach | When the data a company stores is exposed to a hacker. This data could include email addresses, passwords, or credit card information of the company's customers and associates. |
| Security Questions | An alternate way of identifying customers when they have forgotten a password, entered the wrong credentials, or tried to log in from an unfamiliar device. |
| SSl Certificate | A way for websites to prove that they are encrypting or making it harder for a hacker to gain access to, the data on their site. If you use a site without an SSL Certificate2, you have a higher risk of your information being exposed or stolen. |