

DIGITAL SECURITY
TERMINOLOGY

Create by Ekaterina Kilaberia



"Digital and Cyber security is a shared responsibility, and it boils down to this: in digital and cybersecurity, the more systems we security, the more secure we all are." -Jeh Johnson



page 1-5 .....Introduction................................
page 6-7.....
page 8-9.....
page 10-11..Digital Security.........................
page 12-13...Grooming..................................
page 14-15... Fake..........................................
page 16-17...
page 18-19...
page 20-21...
page 22-23..Computer virus..........................
page 24-25...Password...................................
page 26-27...
page 28-29...
page 30-31...
page 32-33...Privacy.......................................
page 34-35...Cyberbullying ...........................
page 36-37...Dark Web..................................
page 38-39...
page 40-41...
page 42-43...
page 44-45...
page 46-47...
page 48-49...
page 50-51...
page 52-53...
page 54-55...
page 56-57...BLACK HAT HACKER..
page 58-59... Doxing......................
page 60-61...
page 62-63...
page 64-65...
page 66-67...Phishing attack........
page 68-69...
page 70-71...
page 72-73...
page 74-75...cyber blackmail........
page 76-77...VPN......................
page 78-79...
page 80-81...
page 82-83...
page 84-85...
page 86-87...
page 88-89... Bot.............................
page 90-91...
page 92-93...
page 94-95...
page 96-97...
TABLE OF CONTENTS
Irma Gvenetadze - LEPL Kutaisi N31 Public School
Dorina Vacari - IP Gimnaziul Nr. 2, Drochia
What is Digital Security?
Digital security is the collective term that describes the resources employed to protect your online identity, data, and other assets. These tools include web services, antivirus software, smartphone SIM cards, biometrics, and secured personal devices. In other words, digital security is the process used to protect your online identity.
What Kind of Information is Considered a Digital Security Risk?
This data includes your name, phone number, address, email account name, IP address, and, most damaging, your Social Security number. It also includes information that potentially pinpoints your location.
If it has to do with financial transactions, it’s considered personal payment data. This information includes credit and debit card numbers, online banking numbers, and PIN codes.
Also known as personal health information (PHI), this data type encompasses information on your health, including medical history, prescription drugs, health insurance subscriptions, and doctor and hospital visits.
Ekaterina Kilaberia - LEPL Tbilisi N152 Public School
Digital Securit


Please watch this video for more information
https://youtu.be/WbgbWtT5Hoo
Zeinab kakalashvili - LEPL Telavi N5 Public School
One tool common to those who sexually abuse kids is grooming: manipulative behaviors that the abuser uses to gain access to a potential victim, coerce them to agree to the abuse, and reduce the risk of being caught. While these tactics are used most often against younger kids, teens and vulnerable adults are also at risk.
Grooming can take place online or in-person. It’s usually employed by a family member or someone else in the victim’s circle of trust, such as a coach, teacher, youth group leader or others who naturally have some interaction with the victim.
Grooming

Please watch this video for more information
https://youtu.be/IUjwHPah72o
Gvenetadze Irma -
Kutaisi #31 Public School
What is "fake" information?
This is information that does not correspond to the truth and that is often spread in the media, social network, and TV programs.
Misinformation is false or misleading information shared with the intent to mislead or deceive people. This is often not done on purpose because the individual or group believes that the information they are sharing is true.
Misinformation is false or misleading information shared to intentionally deceive others. It is a way to encourage others to agree with the creator's views on a certain topic.
Misinformation can be spread to make money.

How to protect yourself from misinformation?
1. All news should have a reliable source: a specific person or organization
2. We should pay attention to the web addresses, because many fake websites are created to spread misinformation
3. We should carefully check the photos that accompany the information, whether they are real or have already been published or edited with a special program
4. Check the date
5. Main! Keep thinking critically! It will help you distinguish between real and fake news and protect yourself from fraud


Lucia Salatino
Scientifico Statale "Filolao" di Crotone
Ana Tepnadze - LEPL Khashuri
municipality named after D.Kakiashvili #2 public school
Manana Bakradze - LEPL Mikheil
Javakhishvili N 124 Public School
Computer virus
Malware which changes, corrupts, or destroys information, and is then passed on to other systems, usually by otherwise benign means ( e. g. sending an email). In some cases, a virus can actually cause physical damage.
Sabina Stasiak - Szkoła Podstawowa
nr 48 im. AK w Częstochowie



How to protect your computer against viruses?
Installing antivirus software. ...
Regular updates of the system and installed applications. ...
Good habits. ...
Regular data archiving. ...
Safe browser. ...
Removing viruses from infected devices...
Recovering data deleted or damaged by viruses.


Arwa Olaimat - Alznya Secondary School For Girls
password



We always advise:
Do not use common passwords that can be easily guessed, such as the name of the husband or wife, car license plate number, etc.
Hiding the password.
Ensure that the protection program hinders hackers’ attempts to intercept or steal the password.
Do not use a password for many accounts; If cybercriminals reveal the password for one, they can access all other accounts.
Do not use realistic words that are easy for hackers or cybercriminals to find
Arwa olimat
Areen Turki Al-khatib - Rufayda
Alaslamya primary school (Syrians)
Ilias Oikonomakos - ΓΥΜΝΑΣΙΟ ΚΑΝΗΘΟΥ
Yahya abojudeh - Mashar'eh Military School
Ruqaya khawaldh -
Alznya Secondary School For Girls


praivacy




Rusudan Gorgadze - LEPL Tbilisi Vakhtang Gzirishvili Public School N173
Cyberbullying -
Harassment with abusive messages, aggression, intimidation and hooliganism through various Internet services.



https://youtu.be/niaDJdEXk9U?si=urz_EWaQtTZmTJzt
https://youtu.be/0Xo8N9qlJtksi=kBoYmbpbov0U7mqr
https://youtu.be/916K8xRxQZw?si=0__WhjpS7y-rdyFG


See video resources

Njoud alananbeh - King Abdullah
the II for Excellence
The dark web is the undercover collective of internet sites that are only unrestricted by a specialized web browser called TOR. It is operated to maintain internet activity anonymous and private, which can be useful in both legal and illegal activities.
for more information visit
:https://www.investopedia.com/terms/d/dark-web.asp
Let's say you want to go on the dark web to see what information of yours, if any, is floating around. You can install the TOR browser on your system by using a virtual private network. A VPN allows people to use a public network as if they were transmitting information on a private one. It basically gives you privacy on a public network.
As you surf, you'll probably notice that dark website addresses end with the .onion extension rather than the traditional .com, .org, .edu, etc. One word of warning, though. Make sure you have some security software installed because there's a good chance that you may come in contact with malware and phishing scams.
Nada AL-Obaidi -Al Quds Secondary school
Ekaterine Chabukashvili - lepl Akhmeta N2 public school
Tsiala jiashvili - LEPL Gori N10 Public School
smart life
Ransomware
. encrypts files on a victim's device and demands payment (usually in cryptocurrency) for decryption. Ransomware attacks may be delivered through phishing emails, exploit kits, or malicious websites.














Lela jgamaia - LEPL Ludoviko
chantuaria Named Jvari Public School
Ketevan Gogaladze - LEPL Khashuri municipality
named after D.Kakiashvili #2 public school

Nona Papunashvili - LEPL Akhmeta
Municipality Magraani Public School
Eka Kobiashvili - LEPL Telavi N6 Public School
Zaur papiashvili - LEPL Dusheti
Municipality Village Shuakhevi Public School
Çimen Okumuş - Mimar Kemalettin İlkokulu
Bengi Efsa KARKIN - Turgut Özal Secondary School,Türkiye
What Does Black Hat Mean?
The use of the term black hat dates back to the 1950s. It is a term inspired by the bad guys in western movies wearing black hats. In the digital age, it is the name given to people who maliciously infiltrate computer networks for their own benefit. Black hat hackers (black hat hackers) continue their work illegally and are not officially affiliated with any institution. Their purpose may be to infiltrate the devices of individuals or institutions, to steal information, or to damage software and render it unusable. Most of the time, it continues with cyber blackmail. They demand money to restore the system and not make the information public.

Bengi Efsa KARKIN/TURGUT ÖZAL SECONDARY SCHOOL,TÜRKİYE
Black Hat Techniques and Ways of Protection
• Suspicious links are one of the most used methods in black hat attacks. When you click on the links that will appear while listening to music, downloading programs or entering untrusted sites, you may cause all your information to be captured. For this reason, you should never click on links you do not know.
• Viruses infecting the USB may cause your device to meet viruses and make you vulnerable to attacks. For this reason, it is useful not to use USB drivers that do not belong to you.
• Passwords such as “12345”, “password”, “password” are frequently used almost everywhere in the world. It is important that you do not use the same passwords on your devices and accounts and that you use different characters as much as possible.
Bengi Efsa KARKIN/TURGUT ÖZAL SECONDARY SCHOOL,TÜRKİYE
Pikria Jangavadze - LEPL Tskaltubo Municipality
Village Opshkviti Public School
In recent years, Doxing has become one of the most popular forms of cyberullying.
Doxing is a term that refers to collecting and publishing a person's personal information without their consent.
Dockers use various techniques to obtain this information, such as social engineering, social media searches, or hacking tools.
Sometimes they use fake profiles to get information directly from you. Doxers can search social networks such as Facebook, Twitter, or LinkedIn to find a victim's personal information, such as their full name, workplace, address, or phone number.
What is Doxing?


* We must not post sensitive information on social networks, forums or other public websites!
* Make sure our online accounts are protected with strong passwords!
* If w1e discover that our personal data has been published online, we must take immediate action!
* If we become a victim of Doxing, we can report it to local authorities or to the online platforms where our information was
How to avoid
d o x i n g ?


Nino chigitashvili - LEPL Kakheti
municipality village Akhmeta public school
NESRİN ALTINKARGI - Manisa Sosyal Bilimler Lisesi
- Full access to our public library
- Save favorite books
- Interact with authors


DIGITAL SECURITY
TERMINOLOGY

Create by Ekaterina Kilaberia



"Digital and Cyber security is a shared responsibility, and it boils down to this: in digital and cybersecurity, the more systems we security, the more secure we all are." -Jeh Johnson



- < BEGINNING
- END >
-
DOWNLOAD
-
LIKE
-
COMMENT()
-
SHARE
-
SAVE
-
BUY THIS BOOK
(from $19.39+) -
BUY THIS BOOK
(from $19.39+) - DOWNLOAD
- LIKE
- COMMENT ()
- SHARE
- SAVE
- Report
-
BUY
-
LIKE
-
COMMENT()
-
SHARE
- Excessive Violence
- Harassment
- Offensive Pictures
- Spelling & Grammar Errors
- Unfinished
- Other Problem
COMMENTS
Click 'X' to report any negative comments. Thanks!