1
2
3
4
5
100

Phishing

A type of scam where an attacker attempts to trick a user into revealing sensitive information, often through fake emails or websites.

100

Cybercrime

Any illegal activity committed over the internet.

100

Secure Site

website that uses encryption (often indicated by "https://") to protect your information when making online transactions.

100

Data privacy

A computer user's ability to choose who or what has access to their data and personal information.

100

Fraud

their permission, to commit fraud or other crimes. Password. a secret word or phrase that must be used to gain admission to something.

200

Malware

Short for malicious software, this includes viruses, spyware, and other programs designed to damage or gain unauthorized access to a computer or network.

200

Virus

A type of malware that infects files and can spread to other computers.

200

VPN

A tool that masks your IP address and encrypts your internet traffic to enhance privacy.

200

Bot

autonomous program that does a certain task (like a robot) – The Facebook engineer programmed a bot to store users' personal data.

200

Cyberstalking

Methods individuals use to track, lure, or harass another person online. D. Discussion Boards.

300

Cyberbullying

the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.

300

Adware

Software that displays unwanted advertisements.

300

Botnet

a network of bots connected via the Internet to perform tasks, such as installing malware, sending spam, or attacking other computers.

300

Backdoor

A hidden or undocumented entry point in software or systems that bypasses normal authentication or security controls.

300

Grooming

The process used by predators to gain the trust of victims and to build false relationships. E-Mail.

400

Hacker

An individual who gains unauthorized access to a computer system.

400

Firewall

A security system that acts as a barrier to prevent unauthorized access to or from a private network.

400

Breach

The result of a hacker successfully breaking into a system, gaining control of its network and exposing its data, usually personal data.

400

Ransomware

A form of malware that hijacks your system and encrypts your files, denying you access to them until you send money to unlock everything.

400

Cybersecurity

Measures taken to protect a computer or computer system against hackers or others trying to steal your data.

500

Online Predator

An adult who uses the internet to seek out and harm children.

500

Ecryption

The process of encoding data so that only authorized parties can read it.

500

IP address

A unique number that identifies your computer while you're online. It acts like a home address for your computer.

500

Browser

A list of webpages you have visited online that is stored in your web browser.

500

Password

A string of letters, numbers and symbols that you use to access your online accounts.