Types of Software
All About Security
Intellectual Property
Browsing the Internet
100

This can be freely used, copied, modified and redistributed. Its source code is available and is known as open source. Examples LibreOffice, GIMP, Audacity

free software

100

it is recommended that this includes both uppercase and lowercase letters, and is at least 8 characters long. it also must be memorable!

a password

100

the rules and principles that protect the moral and economic rights recognized by law for the authors of a published or unpublished work

Copyright

100

the abbreviation for a domain name server

DNS

200

A license that accompanies packages distributed by the GNU Project. The author reserves the rights and permits redistribution and modification under the same license.

GNU/GPL (general public licence)

200

this is a method more secure than a password for ensuring the person logging into an account is who they say they are

biometrics &/ two-factor authentication

200

the symbol that denotes copyright (please describe)

©

200

the trace that you leave on the internet

digital footprint

300

A company's software sold for profit. i.e. Microsoft Office, Windows 10

Commercial software

300

a cyberattack that occurs when a hacker imitates the name of a nearby network, and as someone mistakenly connects to it- the hacker steals their information

man-in-the-middle attack

300
when you agree to give a social media site permission to use your data or license your content as their own, you are doing this

waiving your rights

300

a set of rules that we should follow to behave correctly online.

Netiquette

400

User licence that accompanies free software so it can be modified or redistributed.

Copyleft

400

biological measurements used to identify people, such as our fingerprint (used by some mobile devices and computers), facial recognition and retinal reading.

Biometrics

400

these explain a set of rules for usage on a given social media site, as well as your rights surrounding privacy and the sale of your data

privacy policy &/ terms of use

400

a person that hides their unknown identity in order to provoke, make irrelevant comments, and annoy people.

troll

500

Examples Avast, Adobe Flash Player

Freeware

500

a system which sends a second password to a different device to the one being used in order to verify the user logging in

two-factor authentification

500

all the copyright affecting the arrangement and use of a creation.

Intellectual Property

500

the online, virtual, representation of you; a persona made from your data.

digital identity