
DICTIONARY

A is for
Avoid: Avoid from share your location.
Authentication: Verifying the identity of users to ensure they are who they claim to be.
Antivirus: Software designed to detect and remove malicious software from computers and devices.
Awareness: Being informed and cautious about potential online threats and risks.
Anonymity: Protecting one's identity and personal information while online.
Access control: Limiting and controlling who can access certain information or resources on the internet.
B is for
Bowsing: Refers to the act of navigating websites and online content.
Blocking: The action of preventing access to certain websites or content.
Backup: Making copies of important data to protect against loss or cyber attacks.
Beware: A reminder to be cautious and vigilant while using the internet.
Biometrics: Using unique physical characteristics for authentication and security purposes.
C is for
Cyberbullying: This refers to the use of electronic communication to bully, harass, or threaten someone. Can occur through social media, messaging apps, or other platforms.
Cookies: Cookies are small pieces of data stored on your device by websites you visit. They can track your online activity, preferences, and login information. It's important to manage your cookies to protect your privacy.
3. Content filtering: Content filtering is a method used to restrict or control the type of content that can be accessed on the internet. It is often used to block inappropriate or harmful content.
Cybersecurity: Cybersecurity involves protecting computer systems, networks, and data from cyber threats such as hacking, malware, and phishing.
C is for
Cyberbullying: This refers to the use of electronic communication to bully, harass, or threaten someone. Can occur through social media, messaging apps, or other platforms.
Cookies: Cookies are small pieces of data stored on your device by websites you visit. They can track your online activity, preferences, and login information. It's important to manage your cookies to protect your privacy.
3. Content filtering: Content filtering is a method used to restrict or control the type of content that can be accessed on the internet. It is often used to block inappropriate or harmful content.
Cybersecurity: Cybersecurity involves protecting computer systems, networks, and data from cyber threats such as hacking, malware, and phishing.
D is for
Data Encryption: The process of converting data into a code to prevent unauthorized access. Encryption is crucial for protecting sensitive information, such as passwords, personal data, and financial details, from cyber threats.
Deepfake: A synthetic media technique that uses artificial intelligence to create hyper-realistic fake videos, images, or audio recordings. Deepfakes can be used to spread disinformation, manipulate public opinion, or defame individuals, highlighting the importance of media literacy and critical thinking skills in the digital age.
Device Security: Measures and protocols implemented to protect electronic devices, such as computers, smartphones, and tablets, from cyber threats. This includes installing antivirus software, enabling firewalls, and regularly updating software to patch security vulnerabilities.
D is for
Digital Citizenship: The responsible and ethical use of technology and online resources. Digital citizenship encompasses aspects such as respecting others' privacy, practicing good cyber hygiene, and contributing positively to online communities.
Digital Footprint: The trail of data left behind by an individual's online activities. This includes social media posts, website visits, online purchases, and any other interactions conducted on the internet. Managing one's digital footprint is essential for safeguarding privacy and reputation online.
Digital literacy: refers to the ability to use technology and digital tools safely, responsibly, and effectively. It involves understanding how to navigate the online world, critically evaluate information, protect personal data, and communicate respectfully in digital environments. Developing digital literacy skills is essential for staying safe and making informed decisions while using the internet and other digital platforms.
Digital Citizenship: The responsible and ethical use of technology and online resources. Digital citizenship encompasses aspects such as respecting others' privacy, practicing good cyber hygiene, and contributing positively to online communities.
E is for
Encryption is the process of converting information or data into a code to prevent unauthorized access. It helps protect sensitive information and ensures privacy and security online.
e-Safety is often defined as the safe and responsible use of technology. This includes the use of the internet and also other means of communication using electronic media (eg text messages, gaming devices, email etc).
F is for
Filtering is the process of blocking or restricting access to certain websites, content, or online services based on predefined criteria. Filtering software is commonly used to prevent users, especially children, from accessing inappropriate or harmful material on the internet.
Fraud deceptive or dishonest behavior intended to result in financial gain or other benefits at the expense of others. Online fraud encompasses various forms, including phishing scams, identity theft, and online shopping fraud, highlighting the importance of vigilance and cybersecurity awareness
G is for
Guardianship: Refers to the responsibility of parents, guardians, or caregivers to ensure the online safety of children and minors. Guidelines: eSafety guidelines are recommendations or rules designed to help individuals navigate the internet safely and responsibly.
Geotagging: The process of adding geographical identification metadata to various media such as photos, videos, websites, or social media posts. It can pose risks to privacy and security if not used cautiously.
Grooming: In the context of eSafety, grooming refers to the process by which an individual builds a relationship and trust with a minor with the intention of exploiting or abusing them, often for sexual purposes.
H is for
Hacking: Unauthorized access to computer systems or networks, often with malicious intent. It's a significant cybersecurity concern and can lead to data breaches, identity theft, and other forms of cybercrime.
Hate speech: Online communication that expresses hatred or promotes discrimination against individuals or groups based on characteristics such as race, ethnicity, religion, gender, sexual orientation, disability, or nationality. Combatting hate speech is crucial for promoting a safe and inclusive online environment. Harassment: Persistent and unwanted behavior that causes distress or discomfort to others online. This can include cyberbullying, stalking, trolling, or any form of intimidation or coercion.
Hoaxes: False or misleading information spread online with the intention to deceive or manipulate. Hoaxes can contribute to misinformation and disinformation, impacting individuals' trust in online content and platforms.
J is for
Java security: refers to the measures and protocols put in place to protect Java applications and systems from potential security threats and vulnerabilities.
Junk email filtering: is a process used by email providers to automatically detect and remove unwanted or unsolicited emails, commonly known as spam, from reaching your inbox. This helps to keep your inbox organized and free from potentially harmful or irrelevant messages
JavaScript security: refers to the practices and techniques used to protect websites and web applications that utilize JavaScript from potential security threats and vulnerabilities. By implementing proper JavaScript security measures, developers can help ensure that their applications are safe from malicious attacks and unauthorized access.
K is for
Know-How: Refers to the knowledge and skills needed to navigate the online world safely and responsibly.
Keep Safe: A general reminder to stay safe and protect personal information while using the internet.
Keylogger: A type of software that records keystrokes on a computer without the user's knowledge.
Kik: A messaging app that has been associated with online safety concerns due to its anonymity features.
L is for
Login: This is the process of entering your credentials (such as username and password) to access a system or platform.
Logout: This is the action of ending your current session or connection with a system or platform, usually to ensure security and privacy.
Link: This typically refers to connecting or associating one piece of information or data with another. In the context of a chat AI, it could mean providing a link to additional resources or information.
Location: This could refer to the physical or digital location of a user or device, which can be used for various purposes such as providing personalized services or tracking activities.
M is for
Malware: Malware is malicious software designed to disrupt, damage, or gain unauthorized access to a computer system or network. It includes viruses, worms, ransomware, spyware, and other harmful programs.
Monitoring: Monitoring involves keeping track of online activities, such as internet browsing, social media usage, and communication, to ensure safety and security. It helps in identifying potential risks and taking necessary actions to prevent cyber threats.
Moderation: Supervising online interactions to prevent harmful behavior.
N is for
1. Netiquette: Netiquette refers to the etiquette or code of behavior for interacting online. It includes guidelines on how to communicate respectfully, responsibly, and safely in digital environments such as social media, email, and online forums.
Network Security: Network security involves implementing measures to protect the integrity, confidentiality, and availability of data transmitted over a network. This includes using firewalls, encryption, intrusion detection systems, and other tools to safeguard against unauthorized access and cyber threats.
O is for
Online Privacy: Online privacy refers to the protection of personal information shared or stored on the internet. It involves controlling the collection, use, and sharing of data to prevent unauthorized access or misuse.
Oversharing: Oversharing is the act of disclosing too much personal information online, which can lead to privacy risks, identity theft, or cyberbullying. It's important to be mindful of what you share on the internet to protect yourself and others.
P is for
Phishing: Phishing is a type of cyber attack where attackers try to trick individuals into providing sensitive information such as passwords, credit card numbers, or personal details by posing as a trustworthy entity.
Privacy settings: Privacy settings refer to the controls and options available on websites, apps, and devices that allow users to manage who can access their personal information and how it is shared.
Parental controls: Parental controls are tools and features that allow parents to monitor and restrict their children's online activities, such as limiting screen time, blocking inappropriate content, and setting age-appropriate restrictions.
Password security: Password security involves using strong, unique passwords for each online account and regularly updating them to protect against unauthorized access and data breaches.
Personal data protection: Personal data protection refers to the measures taken to safeguard individuals' personal information from unauthorized access, misuse, and disclosure, in compliance with data protection laws and regulations.
Q is for
Quarantine: In terms of esafety, quarantine refers to isolating potentially harmful files or software to prevent them from causing harm to your device or network.
Query: A query in esafety context refers to a question or request for information, often used when searching for safe and reliable online resources.
R is for
Ransomware: A type of malicious software that encrypts a user's files and demands payment in exchange for the decryption key.
Remote access: The ability to access a computer or network from a different location using the internet or other network connections.
Reporting: The act of notifying authorities or relevant parties about online threats, harassment, or illegal activities.
Router security: Measures taken to secure a router from unauthorized access, such as changing default passwords and enabling encryption.
Risk assessment: The process of evaluating potential cybersecurity risks and vulnerabilities to determine the likelihood and impact of a security breach.
S is for
Spoofing: Impersonating or falsifying data to gain unauthorized access or deceive users.
Social Engineering: Psychological manipulation of individuals to obtain sensitive information or illicit access to systems.
Spyware: Malicious software that secretly gathers user information and activities without consent.
SQL Injection: A type of attack on database-driven web applications. Attackers inject SQL queries to manipulate the database or retrieve sensitive information.
Security Audit: Systematic assessment and evaluation of a system, network, or application to identify security vulnerabilities.
S is for
Security Patch: Software update released to fix security vulnerabilities in a program or operating system.
SSL/TLS: Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are cryptographic protocols used to secure internet communication.
Security Policy: Formal document or guide outlining security standards, procedures, and rules for an organization or system.
Session Hijacking: Unauthorized seizure of an active session to gain control or access to a system or application.
Security Breach: Unauthorized access, disclosure, or compromise of sensitive information due to a violation of security measures in a system, network, or application.
T is for
Threat: Any potential danger to information or systems that could lead to exploitation, damage, or loss.
Trojan Horse: Malicious software disguised as legitimate software to trick users into installing it. Once installed, it can perform various harmful actions without the user's knowledge.
Two-Factor Authentication (2FA): A security process that requires users to provide two different authentication factors to verify their identity, typically something they know (like a password) and something they have (like a smartphone for receiving a code).
- Full access to our public library
- Save favorite books
- Interact with authors

DICTIONARY

A is for
Avoid: Avoid from share your location.
Authentication: Verifying the identity of users to ensure they are who they claim to be.
Antivirus: Software designed to detect and remove malicious software from computers and devices.
Awareness: Being informed and cautious about potential online threats and risks.
Anonymity: Protecting one's identity and personal information while online.
Access control: Limiting and controlling who can access certain information or resources on the internet.
B is for
Bowsing: Refers to the act of navigating websites and online content.
Blocking: The action of preventing access to certain websites or content.
Backup: Making copies of important data to protect against loss or cyber attacks.
Beware: A reminder to be cautious and vigilant while using the internet.
Biometrics: Using unique physical characteristics for authentication and security purposes.
C is for
Cyberbullying: This refers to the use of electronic communication to bully, harass, or threaten someone. Can occur through social media, messaging apps, or other platforms.
Cookies: Cookies are small pieces of data stored on your device by websites you visit. They can track your online activity, preferences, and login information. It's important to manage your cookies to protect your privacy.
3. Content filtering: Content filtering is a method used to restrict or control the type of content that can be accessed on the internet. It is often used to block inappropriate or harmful content.
Cybersecurity: Cybersecurity involves protecting computer systems, networks, and data from cyber threats such as hacking, malware, and phishing.
- < BEGINNING
- END >
-
DOWNLOAD
-
LIKE(1)
-
COMMENT()
-
SHARE
-
SAVE
-
BUY THIS BOOK
(from $7.19+) -
BUY THIS BOOK
(from $7.19+) - DOWNLOAD
- LIKE (1)
- COMMENT ()
- SHARE
- SAVE
- Report
-
BUY
-
LIKE(1)
-
COMMENT()
-
SHARE
- Excessive Violence
- Harassment
- Offensive Pictures
- Spelling & Grammar Errors
- Unfinished
- Other Problem
COMMENTS
Click 'X' to report any negative comments. Thanks!