Cyber Foundations Unit 1 Vocabulary
uniform resource locator (URL)
the address for a specific webpage or file on the internet
software piracy
the illegal copying, distribution, or use of computer software
online personalities
the social identities that an internet user establishes in online communities and websites
spam
unwanted or inappropriate messages sent via email
internet safety
the act of staying safe online
adware
software that automatically displays or downloads advertising material online, usually unwanted
discussion board
a general term for any online "bulletin board" where you can leave messages and expect to see responses to messages you have left
hacking
a kind of cybercrime in which a criminal uses a computer system to gain access to data on another computing system in order to steal information or corrupt the system
phishing
a kind of cybercrime in which the criminal sends fake emails or messages in an attempt to get people to enter their personal information
learning management system
a software tool that allows you to create, deliver, and report on training courses and programs
spoofing
a type of cybercrime scam in which criminals attempt to obtain people's personal information by pretending to be a legitimate business, friend, or some other innocent party
trojan horse
a type of malware that disguises itself as something else in order to trick you so that cyber-thieves and hackers can gain access to your system
worm
a type of malware that gets into a computer and affects the functions of software and hardware programs, and it copies itself and moves to other computer systems
internet
a vast computer network linking smaller computer networks worldwide
social network
a website or application that enables users to communicate with each other by posting information, comments, messages, images, etc.
wiki
a website that allows users to add or change content on the site (Wikipedia is a famous one)
World Wide Web
all the web pages, pictures, videos and other online content that can be accessed with a web browser
cyberbullying
bullying that takes place over electronic devices such as computers and cell phones
encryption
converting data into code in order to protect private information
cybercrime
crime that uses a computer network
computer ethics
decisions regarding professional and social conduct while using technology
blog
discussion or informational website or web page that is written in diary style
copyright
legal right given to the person/people who originally created a product
computer virus
malware program that can change the way a computer operates and can spread to other computers through attachments, files, etc.
spyware
malware program that secretly monitors what computer uses do in order to capture information like Web browsing habits, e-mail messages, usernames and passwords, and credit card information
ethics
moral principles that guide our behavior
software
program that tells a computer what to do
firewall
program used to help protect a computer system from malware & cybercrime attacks by blocking unauthorized access to the system
e-mail (electronic mail)
sending messages via a computer network
browser
software program such as Google Chrome and Internet Explorer that is used to access the World Wide Web
malware
software programs designed to damage or do other unwanted actions on a computer system