Internet Safety Vocab
Protecting Personal Info
What is it?
100

Malicious software designed to damage or disrupt a computer system, or steal information.

Malware

100

A string of characters used to verify the identity of a user during the authentication process

Password

100

A student is looking for a pair of expensive sneakers and stumbles upon a website offering them at a price way below market value. The website looks slightly off, but the student, eager for a deal, enters their payment information. After the transaction, the shoes never arrive, and the website disappears.

Scam

200

A type of malware that locks users out of their device or encrypts their files, demanding payment to restore access.

Ransomware

200

A security method that requires two different forms of identification to access resources or data

Two-Factor Authentication

200

A student receives an email offering a scholarship that seems like a perfect fit. The scholarship asks for personal details like Social Security numbers and an upfront fee to process the application. In reality, this is a scam designed to steal identity information and money from unsuspecting students.


Scam

300

Deliberate deception for financial or personal gain.

Fraud

300

What is the first thing to do when you suspect somebody is spying on you when online?

Shut the device down

300

Imagine you find a free game that looks fun and download it from a random website, not from a trusted app store. The game works, but behind the scenes, it installs spyware on your device. The spyware quietly tracks everything you do—your texts, your social media logins, and even your online shopping passwords. You might not even notice, but your personal information could be sent to hackers who use it for identity theft or sell it on the dark web.

Spyware

400

A type of malware that replicates itself and spreads from one device to another, often damaging systems.

Virus
400

How to avoid Scholarship Scams?

Be suspicious of upfront payment requests.

400

Any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems

Malware

500

A fraudulent attempt to steal sensitive information, such as passwords or credit card numbers, by pretending to be a trustworthy entity.


Phishing

500

How to avoid Online Shopping Scam?

Research unknown websites.

500

Somebody stole your online information and is making you pay to get it back.

Ransomware

M
e
n
u