DICTIONARY
A is for
Avoid: Avoid from share your location.
Authentication: Verifying the identity of users to ensure they are who they claim to be.
Antivirus: Software designed to detect and remove malicious software from computers and devices.
Awareness: Being informed and cautious about potential online threats and risks.
Anonymity: Protecting one's identity and personal information while online.
Access control: Limiting and controlling who can access certain information or resources on the internet.
B is for
Bowsing: Refers to the act of navigating websites and online content.
Blocking: The action of preventing access to certain websites or content.
Backup: Making copies of important data to protect against loss or cyber attacks.
Beware: A reminder to be cautious and vigilant while using the internet.
Biometrics: Using unique physical characteristics for authentication and security purposes.
C is for
Cyberbullying: This refers to the use of electronic communication to bully, harass, or threaten someone. Can occur through social media, messaging apps, or other platforms.
Cookies: Cookies are small pieces of data stored on your device by websites you visit. They can track your online activity, preferences, and login information. It's important to manage your cookies to protect your privacy.
3. Content filtering: Content filtering is a method used to restrict or control the type of content that can be accessed on the internet. It is often used to block inappropriate or harmful content.
Cybersecurity: Cybersecurity involves protecting computer systems, networks, and data from cyber threats such as hacking, malware, and phishing.
C is for
Cyberbullying: This refers to the use of electronic communication to bully, harass, or threaten someone. Can occur through social media, messaging apps, or other platforms.
Cookies: Cookies are small pieces of data stored on your device by websites you visit. They can track your online activity, preferences, and login information. It's important to manage your cookies to protect your privacy.
3. Content filtering: Content filtering is a method used to restrict or control the type of content that can be accessed on the internet. It is often used to block inappropriate or harmful content.
Cybersecurity: Cybersecurity involves protecting computer systems, networks, and data from cyber threats such as hacking, malware, and phishing.
D is for
Data Encryption: The process of converting data into a code to prevent unauthorized access. Encryption is crucial for protecting sensitive information, such as passwords, personal data, and financial details, from cyber threats.
Deepfake: A synthetic media technique that uses artificial intelligence to create hyper-realistic fake videos, images, or audio recordings. Deepfakes can be used to spread disinformation, manipulate public opinion, or defame individuals, highlighting the importance of media literacy and critical thinking skills in the digital age.
Device Security: Measures and protocols implemented to protect electronic devices, such as computers, smartphones, and tablets, from cyber threats. This includes installing antivirus software, enabling firewalls, and regularly updating software to patch security vulnerabilities.
D is for
Digital Citizenship: The responsible and ethical use of technology and online resources. Digital citizenship encompasses aspects such as respecting others' privacy, practicing good cyber hygiene, and contributing positively to online communities.
Digital Footprint: The trail of data left behind by an individual's online activities. This includes social media posts, website visits, online purchases, and any other interactions conducted on the internet. Managing one's digital footprint is essential for safeguarding privacy and reputation online.
Digital literacy: refers to the ability to use technology and digital tools safely, responsibly, and effectively. It involves understanding how to navigate the online world, critically evaluate information, protect personal data, and communicate respectfully in digital environments. Developing digital literacy skills is essential for staying safe and making informed decisions while using the internet and other digital platforms.
Digital Citizenship: The responsible and ethical use of technology and online resources. Digital citizenship encompasses aspects such as respecting others' privacy, practicing good cyber hygiene, and contributing positively to online communities.
E is for
Encryption is the process of converting information or data into a code to prevent unauthorized access. It helps protect sensitive information and ensures privacy and security online.
e-Safety is often defined as the safe and responsible use of technology. This includes the use of the internet and also other means of communication using electronic media (eg text messages, gaming devices, email etc).
F is for
G is for
Guardianship: Refers to the responsibility of parents, guardians, or caregivers to ensure the online safety of children and minors. Guidelines: eSafety guidelines are recommendations or rules designed to help individuals navigate the internet safely and responsibly.
Geotagging: The process of adding geographical identification metadata to various media such as photos, videos, websites, or social media posts. It can pose risks to privacy and security if not used cautiously.
Grooming: In the context of eSafety, grooming refers to the process by which an individual builds a relationship and trust with a minor with the intention of exploiting or abusing them, often for sexual purposes.
H is for
Hacking: Unauthorized access to computer systems or networks, often with malicious intent. It's a significant cybersecurity concern and can lead to data breaches, identity theft, and other forms of cybercrime.
Hate speech: Online communication that expresses hatred or promotes discrimination against individuals or groups based on characteristics such as race, ethnicity, religion, gender, sexual orientation, disability, or nationality. Combatting hate speech is crucial for promoting a safe and inclusive online environment. Harassment: Persistent and unwanted behavior that causes distress or discomfort to others online. This can include cyberbullying, stalking, trolling, or any form of intimidation or coercion.
Hoaxes: False or misleading information spread online with the intention to deceive or manipulate. Hoaxes can contribute to misinformation and disinformation, impacting individuals' trust in online content and platforms.
J is for
Java security: refers to the measures and protocols put in place to protect Java applications and systems from potential security threats and vulnerabilities.
Junk email filtering: is a process used by email providers to automatically detect and remove unwanted or unsolicited emails, commonly known as spam, from reaching your inbox. This helps to keep your inbox organized and free from potentially harmful or irrelevant messages
JavaScript security: refers to the practices and techniques used to protect websites and web applications that utilize JavaScript from potential security threats and vulnerabilities. By implementing proper JavaScript security measures, developers can help ensure that their applications are safe from malicious attacks and unauthorized access.
K is for
Know-How: Refers to the knowledge and skills needed to navigate the online world safely and responsibly.
Keep Safe: A general reminder to stay safe and protect personal information while using the internet.
Keylogger: A type of software that records keystrokes on a computer without the user's knowledge.
Kik: A messaging app that has been associated with online safety concerns due to its anonymity features.
L is for
Login: This is the process of entering your credentials (such as username and password) to access a system or platform.
Logout: This is the action of ending your current session or connection with a system or platform, usually to ensure security and privacy.
Link: This typically refers to connecting or associating one piece of information or data with another. In the context of a chat AI, it could mean providing a link to additional resources or information.
Location: This could refer to the physical or digital location of a user or device, which can be used for various purposes such as providing personalized services or tracking activities.
M is for
Malware: Malware is malicious software designed to disrupt, damage, or gain unauthorized access to a computer system or network. It includes viruses, worms, ransomware, spyware, and other harmful programs.
Monitoring: Monitoring involves keeping track of online activities, such as internet browsing, social media usage, and communication, to ensure safety and security. It helps in identifying potential risks and taking necessary actions to prevent cyber threats.
Moderation: Supervising online interactions to prevent harmful behavior.
N is for
1. Netiquette: Netiquette refers to the etiquette or code of behavior for interacting online. It includes guidelines on how to communicate respectfully, responsibly, and safely in digital environments such as social media, email, and online forums.
Network Security: Network security involves implementing measures to protect the integrity, confidentiality, and availability of data transmitted over a network. This includes using firewalls, encryption, intrusion detection systems, and other tools to safeguard against unauthorized access and cyber threats.
O is for
Online Privacy: Online privacy refers to the protection of personal information shared or stored on the internet. It involves controlling the collection, use, and sharing of data to prevent unauthorized access or misuse.
Oversharing: Oversharing is the act of disclosing too much personal information online, which can lead to privacy risks, identity theft, or cyberbullying. It's important to be mindful of what you share on the internet to protect yourself and others.
P is for
Phishing: Phishing is a type of cyber attack where attackers try to trick individuals into providing sensitive information such as passwords, credit card numbers, or personal details by posing as a trustworthy entity.
Privacy settings: Privacy settings refer to the controls and options available on websites, apps, and devices that allow users to manage who can access their personal information and how it is shared.
Parental controls: Parental controls are tools and features that allow parents to monitor and restrict their children's online activities, such as limiting screen time, blocking inappropriate content, and setting age-appropriate restrictions.
Password security: Password security involves using strong, unique passwords for each online account and regularly updating them to protect against unauthorized access and data breaches.
Personal data protection: Personal data protection refers to the measures taken to safeguard individuals' personal information from unauthorized access, misuse, and disclosure, in compliance with data protection laws and regulations.
Q is for
Quarantine: In terms of esafety, quarantine refers to isolating potentially harmful files or software to prevent them from causing harm to your device or network.
Query: A query in esafety context refers to a question or request for information, often used when searching for safe and reliable online resources.
R is for
Ransomware: A type of malicious software that encrypts a user's files and demands payment in exchange for the decryption key.
Remote access: The ability to access a computer or network from a different location using the internet or other network connections.
Reporting: The act of notifying authorities or relevant parties about online threats, harassment, or illegal activities.
Router security: Measures taken to secure a router from unauthorized access, such as changing default passwords and enabling encryption.
Risk assessment: The process of evaluating potential cybersecurity risks and vulnerabilities to determine the likelihood and impact of a security breach.
S is for
Spoofing: Impersonating or falsifying data to gain unauthorized access or deceive users.
Social Engineering: Psychological manipulation of individuals to obtain sensitive information or illicit access to systems.
Spyware: Malicious software that secretly gathers user information and activities without consent.
SQL Injection: A type of attack on database-driven web applications. Attackers inject SQL queries to manipulate the database or retrieve sensitive information.
Security Audit: Systematic assessment and evaluation of a system, network, or application to identify security vulnerabilities.
S is for
Security Patch: Software update released to fix security vulnerabilities in a program or operating system.
SSL/TLS: Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are cryptographic protocols used to secure internet communication.
Security Policy: Formal document or guide outlining security standards, procedures, and rules for an organization or system.
Session Hijacking: Unauthorized seizure of an active session to gain control or access to a system or application.
Security Breach: Unauthorized access, disclosure, or compromise of sensitive information due to a violation of security measures in a system, network, or application.
T is for
Threat: Any potential danger to information or systems that could lead to exploitation, damage, or loss.
Trojan Horse: Malicious software disguised as legitimate software to trick users into installing it. Once installed, it can perform various harmful actions without the user's knowledge.
Two-Factor Authentication (2FA): A security process that requires users to provide two different authentication factors to verify their identity, typically something they know (like a password) and something they have (like a smartphone for receiving a code).
T is for
TLS (Transport Layer Security): A cryptographic protocol used to secure communications over a network, commonly used to protect web traffic, email, and other internet services.
Threat Intelligence: Information about potential or current cybersecurity threats gathered, analyzed, and used to inform security decisions and defenses.
Tokenization: The process of replacing sensitive data with unique identifiers or tokens to protect it from unauthorized access. Tokenization is commonly used in payment systems to secure credit card information.
T is for
Trusted Platform Module (TPM): A hardware-based security feature that provides a secure environment for storing cryptographic keys, ensuring the integrity of the boot process, and supporting various security functions.
Third-Party Risk: The potential security risks posed by external parties, such as vendors, suppliers, or partners, who have access to an organization's systems or data.
Threat Actor: An individual, group, or entity that carries out or has the capability to carry out cyber threats against a target.
Threat Hunting: Proactive and iterative search for signs of potential cyber threats or malicious activities within an organization's network or systems.
U is for
User Authentication: The process of verifying the identity of a user attempting to access a system or application, typically through credentials such as usernames and passwords.
Unauthorized Access: Illegitimate entry into a system, network, or application without proper authorization or permission.
URL Filtering: The process of blocking or allowing access to websites based on predefined criteria or categories, typically used to enforce security policies and prevent users from accessing malicious or inappropriate content.
Update: A software patch or modification released by developers to fix bugs, address security vulnerabilities, or improve functionality in a program or operating system.
U is for
USB Security: Measures taken to protect against security threats associated with USB (Universal Serial Bus) devices, such as malware infections or data theft.
Unified Threat Management (UTM): A comprehensive security solution that combines multiple security features into a single platform, typically including firewall, antivirus, intrusion detection/prevention, VPN, and content filtering capabilities.
User Awareness Training: Educational programs and initiatives designed to raise awareness among users about cybersecurity threats, best practices, and how to protect against them.
U is for
User Permissions: The level of access or privileges granted to a user within a system, network, or application, dictating what actions they can perform and what resources they can access.
Upload: The process of transferring data or files from a local computer or device to a remote server or another device, typically via a network connection.
Usability: The degree to which a system, application, or security measure is user-friendly and easy to use without compromising security.
V is for
Vulnerability: A weakness or flaw in a system, application, or network that could be exploited by attackers to compromise security.
VPN (Virtual Private Network): A secure network connection that encrypts data transmitted between a user's device and a remote server, ensuring privacy and confidentiality over public networks.
Virus: Malicious software that replicates itself and spreads to other files or systems, often causing damage or disrupting normal operations.
Virtualization: The process of creating virtual versions of hardware, operating systems, storage devices, or networks, allowing multiple virtual environments to run on a single physical system.
V is for
Vector: The method or pathway through which a cyber threat is delivered or propagated, such as email attachments, infected websites, or USB drives.
Validation: The process of confirming the authenticity, integrity, or trustworthiness of data, identities, or actions within a system or process.
Vendor Risk Management: The practice of assessing and managing the security risks associated with third-party vendors, suppliers, or service providers who have access to an organization's systems or data.
VoIP (Voice over Internet Protocol): Technology that allows voice communication and multimedia sessions over the internet, often used for making phone calls over IP networks.
V is for
VoIP (Voice over Internet Protocol): Technology that allows voice communication and multimedia sessions over the internet, often used for making phone calls over IP networks.
Virtual Private Server (VPS): A virtualized server environment created by partitioning a physical server into multiple virtual servers, each running its own operating system and applications.
Vaulting: The secure storage and management of sensitive data, cryptographic keys, or credentials in an encrypted and protected environment.
W is for
Web Filtering: The process of controlling access to websites and online content based on predefined criteria. Web filtering software is commonly used to block access to inappropriate or harmful websites, such as those containing adult content, violence, or hate speech, thereby promoting a safer and more secure online environment.
Wi-Fi Security: Measures and protocols implemented to protect wireless networks from unauthorized access and cyber threats. This includes encrypting network traffic, using strong passwords, and regularly updating router firmware to patch security vulnerabilities. Whitelisting: The practice of allowing only approved applications, websites, or email addresses to access a system or network while blocking all others. Whitelisting can help prevent malware infections and unauthorized access by limiting the attack surface and reducing the risk of exposure to malicious content.
Web Browser Security: Features and settings implemented in web browsers to enhance security and protect users from online threats. This includes built-in protections such as phishing and malware detection, as well as options for enabling secure browsing modes and blocking intrusive tracking techniques.
W is for
Wireless Access Point (WAP): A device that allows wireless devices, such as smartphones, tablets, and laptops, to connect to a wired network using Wi-Fi technology. Securing wireless access points is essential for preventing unauthorized access and protecting sensitive data transmitted over the network.
Webcam Privacy: Measures and best practices for safeguarding the privacy and security of webcams and other video devices connected to computers or smart devices. This includes covering webcams when not in use, disabling remote access features, and using reputable security software to prevent unauthorized access or spying.
X is for
XSS (Cross-Site Scripting): A type of security vulnerability commonly found in web applications. XSS attacks occur when attackers inject malicious scripts into web pages viewed by other users. These scripts can steal sensitive information, such as cookies or session tokens, manipulate web content, or redirect users to malicious websites. Preventing XSS vulnerabilities is essential for ensuring the security of web applications and protecting users from potential exploits
Y is for
Youth Protection: Refers to measures, policies, and initiatives aimed at safeguarding children and young people from harm, exploitation, and inappropriate content online. Youth protection efforts include educational programs, parental controls, age-appropriate content filters, and regulations designed to promote a safe and secure online environment for minors.
Z is for
Zero-day Vulnerability: A software vulnerability or security flaw that is exploited by cyber attackers before the software vendor becomes aware of it or has had the opportunity to patch it. Zero-day vulnerabilities pose a significant threat to cybersecurity because there are no available fixes or patches to defend against them. Mitigating zero-day vulnerabilities requires proactive security measures, such as intrusion detection systems, threat intelligence, and rapid response protocols.
DICTIONARY
A is for
Avoid: Avoid from share your location.
Authentication: Verifying the identity of users to ensure they are who they claim to be.
Antivirus: Software designed to detect and remove malicious software from computers and devices.
Awareness: Being informed and cautious about potential online threats and risks.
Anonymity: Protecting one's identity and personal information while online.
Access control: Limiting and controlling who can access certain information or resources on the internet.
B is for
Bowsing: Refers to the act of navigating websites and online content.
Blocking: The action of preventing access to certain websites or content.
Backup: Making copies of important data to protect against loss or cyber attacks.
Beware: A reminder to be cautious and vigilant while using the internet.
Biometrics: Using unique physical characteristics for authentication and security purposes.
C is for
Cyberbullying: This refers to the use of electronic communication to bully, harass, or threaten someone. Can occur through social media, messaging apps, or other platforms.
Cookies: Cookies are small pieces of data stored on your device by websites you visit. They can track your online activity, preferences, and login information. It's important to manage your cookies to protect your privacy.
3. Content filtering: Content filtering is a method used to restrict or control the type of content that can be accessed on the internet. It is often used to block inappropriate or harmful content.
Cybersecurity: Cybersecurity involves protecting computer systems, networks, and data from cyber threats such as hacking, malware, and phishing.