Privacy and Security
Maintenance of practices to secure digital identity, recognize threats, and understand the broader safety implications of working in a digital environment.

Guiding Questions
- Am I aware of the permanence of my actions in a digital environment?
- Am I able to implement practices to secure my privacy, security, and well-being when using digital tools?
- Can I recognize online threats?

Open in Google Sheets
Open in Google SlidesFor more digital skills vocabulary resources, visit the Digital Skills Glossary
Term | Definition |
---|---|
adware | (n) software that includes advertisements, which are displayed while the software is running; some can contain spyware |
algorithm | (n) a set of steps or instructions that a computer or person follows to solve a problem or complete a task |
antivirus software | (n) a computer program that keeps the computer safe from viruses that destroy data |
authentication | (n) proof of the identity of a user logging on to a network |
block | (n) a ban that prevents access to something (v) to stop someone from contacting you |
cookie | (n) data that is put on your computer and read from your computer by a website |
cyberbullying | (n) the act of intimidating a person online |
cyberstalking | (n) the use of technology to follow or harass a person online |
data | (n) a collection of information such as facts or numbers |
data breach | (n) a successful cyberattack to obtain sensitive data |
data leak | (n) accidental exposure of data |
data security | (n) tools and strategies used to keep information safe |
digital footprint | (n) evidence of a person's online activity |
encryption | (n) a process that makes information unreadable to keep it secure |
firewall | (n) software that protects a computer from viruses, spyware, and malware (v) set up software to protect your electronic item from viruses |
hacking | (n) a way to gain access to parts of a computer program |
incognito | (adv) a way to browse the internet so that your browsing history is not saved on your device |
location sharing | (n) act of allowing a device's GPS to share location info with an app |
login | (n) the username & password used to enter a device, account, or network (v) use one's username & password to enter a device, account, or network |
machine learning | (n) a way computers learn to do things by themselves using data and patterns |
malicious email | (n) an email message containing code designed to harm your software system |
malware | (n) software designed to operate in an undesirable way |
online scam | (n) an attempt on the internet to defraud or embezzle |
parental control | (n) a feature included in some television services, computers, mobile devices, or software that allows parents to restrict their children's access to certain content |
passcode | (n) a string of characters used for authentication on a digital device |
password | (n) a string of characters used to login to a computer, network, or account |
phishing | (v) trying to gain sensitive information by pretending to be trustworthy |
pop-up | (n) a window triggered to appear on a computer screen when an Internet user accesses a particular web page |
privacy settings | (n) website and software options that allow a user to set boundaries on what information is shared with others |
ransomware | (n) malware that holds the data of a computer user, usually requiring or claiming to require payment to restore access. |
remember me | (n) an option that saves your login information |
reply | (n) a response to an email or message (v) respond to sender of email via email or to a sender of a message via text. |
reputation | (n) what somebody is known for |
scam | (n) a fraudulent or deceptive scheme (v) to defraud or embezzle |
screen time | (n) the amount of time a person spends using screen-accessed technology (such as television, a computer, a smartphone, etc.) |
secure | (adj) free from attack or danger; protected |
secure site | (n) a website that protects the visitors' information; secure websites have URLs that begin with "https" instead of "http" |
spyware | (n) a program that collects information about the user including web surfing habits and sites visited |
suspicious | (adj) distrustful or tending to suspect |
third-party app | (n) a software application created by a developer who isn't the manufacturer of the device the app runs on or the owner of the website that offers it |
two-step verification | (n) a security method that requires a user to enter two of three types of information to gain access to an account |
username | (n) a person's identification on an individual computer system, network, or account |
virus | (n) software that attacks a computer |
worm | (n) a type of dangerous software that can go across networks of computers |