internet safety vocabulary
Protecting Personal Information
free
100

Bullying that takes place over digital devices like computers, smartphones, or tablets, typically through social media or messaging platforms

cyberbullying

100

Fake websites or sellers can trick you into paying for goods that don’t exist or steal your payment information

fraud

100

The trail of data a person leaves behind while using the internet

Digital Footprint

200

Malicious software designed to damage or disrupt a computer system, or steal information

malware

200

Software that secretly collects information about a user’s activities without their consent

spyware

200

A fraudulent attempt to steal sensitive information, such as passwords or credit card numbers, by pretending to be a trustworthy entity

Phishing

300

A type of malware that locks users out of their device or encrypts their files, demanding payment to restore access

ransomware

300

 Unsolicited and irrelevant emails or messages, often sent in bulk

spam

300

 A type of malware that replicates itself and spreads from one device to another, often damaging systems

Virus

400

The act of creating a fake online identity to deceive others, often for fraudulent or harmful purposes

Catfishing

400

 another tool used by spyware to take snapshots of your screen at specific intervals. This allows hackers to see exactly what you're doing, such as

 Screen Scrapers

400

what are trusted sources to download data from

the Google Play Store or Apple App Store

500

The term "phishing" is a play on the word "_____" Just like a fisherman uses bait to catch fish, cybercriminals use fake emails, messages, or websites as bait to catch unsuspecting victims. The idea is that they are "______" for personal information

fishing

500

a type of spyware that records every key you press on your keyboard. This means everything you type—your passwords, emails, messages, and even online searches—can be tracked and saved by the spyware. Hackers can then access this information to

 Keyloggers

500

what do you need to look out for when using apps

Infected Free Apps or Games

M
e
n
u