Privacy and Security

Maintenance of practices to secure digital identity, recognize threats, and understand the broader safety implications of working in a digital environment.

Guiding Questions

  • Am I aware of the permanence of my actions in a digital environment?
  • Am I able to implement practices to secure my privacy, security, and well-being when using digital tools?
  • Can I recognize online threats?
TermDefinition
adware(n) software that includes advertisements, which are displayed while the software is running; some can contain spyware
algorithm(n) a set of steps or instructions that a computer or person follows to solve a problem or complete a task
antivirus software(n) a computer program that keeps the computer safe from viruses that destroy data
authentication(n) proof of the identity of a user logging on to a network
block(n) a ban that prevents access to something (v) to stop someone from contacting you
cookie(n) data that is put on your computer and read from your computer by a website
cyberbullying(n) the act of intimidating a person online
cyberstalking(n) the use of technology to follow or harass a person online
data(n) a collection of information such as facts or numbers
data breach(n) a successful cyberattack to obtain sensitive data
data leak(n) accidental exposure of data
data security(n) tools and strategies used to keep information safe
digital footprint(n) evidence of a person's online activity
encryption(n) a process that makes information unreadable to keep it secure
firewall(n) software that protects a computer from viruses, spyware, and malware (v) set up software to protect your electronic item from viruses
hacking(n) a way to gain access to parts of a computer program
incognito(adv) a way to browse the internet so that your browsing history is not saved on your device
location sharing(n) act of allowing a device's GPS to share location info with an app
login(n) the username & password used to enter a device, account, or network (v) use one's username & password to enter a device, account, or network
machine learning(n) a way computers learn to do things by themselves using data and patterns
malicious email(n) an email message containing code designed to harm your software system
malware(n) software designed to operate in an undesirable way
online scam(n) an attempt on the internet to defraud or embezzle
parental control(n) a feature included in some television services, computers, mobile devices, or software that allows parents to restrict their children's access to certain content
passcode(n) a string of characters used for authentication on a digital device
password(n) a string of characters used to login to a computer, network, or account
phishing(v) trying to gain sensitive information by pretending to be trustworthy
pop-up(n) a window triggered to appear on a computer screen when an Internet user accesses a particular web page
privacy settings(n) website and software options that allow a user to set boundaries on what information is shared with others
ransomware(n) malware that holds the data of a computer user, usually requiring or claiming to require payment to restore access.
remember me(n) an option that saves your login information
reply(n) a response to an email or message (v) respond to sender of email via email or to a sender of a message via text.
reputation(n) what somebody is known for
scam(n) a fraudulent or deceptive scheme (v) to defraud or embezzle
screen time(n) the amount of time a person spends using screen-accessed technology (such as television, a computer, a smartphone, etc.)
secure(adj) free from attack or danger; protected
secure site(n) a website that protects the visitors' information; secure websites have URLs that begin with "https" instead of "http"
spyware(n) a program that collects information about the user including web surfing habits and sites visited
suspicious(adj) distrustful or tending to suspect
third-party app(n) a software application created by a developer who isn't the manufacturer of the device the app runs on or the owner of the website that offers it
two-step verification(n) a security method that requires a user to enter two of three types of information to gain access to an account
username(n) a person's identification on an individual computer system, network, or account
virus(n) software that attacks a computer
worm(n) a type of dangerous software that can go across networks of computers