A. Glossary

ad blocker A feature built in to a web browser (or that’s added to a web browser using an optional plug-in) that blocks most online ads from being displayed and often helps to protect users from having their online activities tracked by advertisers or website operators.

AnnualCreditReport.com A website operated by the U.S. government in conjunction with Experian, Equifax, and TransUnion that allows people to request free copies of their credit reports once every 12 months.

cloud computing The use of online-based storage to archive, back up, share, and store files and/or photos.

cookie Information pertaining to a specific website that is stored on your computer by your web browser. A cookie allows website operators to track and remember information about you each time you visit their website.

credit monitoring service A subscription-based service that continuously monitors your credit reports and automatically alerts you if any changes or inquiries are made. It is one way to protect against identity theft and online fraud.

credit reporting agency Formerly known as “credit bureaus,” Equifax, Experian, and TransUnion are for-profit companies that measure the credit rating of every consumer and compile information into credit reports that are widely used by lenders, banks, insurance companies, employers, and utility companies to measure someone’s credit worthiness.

credit scores Based on the information in someone’s credit report, a credit score is calculated by Fair Isaac Corporation or one of the credit reporting agencies. Someone’s credit score is used by lenders and creditors to make quick approval decisions.

data breach This occurs when a cybercriminal hacks in to the database of a company and steals private information.

electronic payment services These services provide a means for making online payments. Services such as PayPal and Apple Pay help protect consumers by serving as a secure middleman between online vendors and online shoppers by processing payments in a way that limits the amount of information provided to the vendor.

firewall Software- or hardware-based protection that’s added to a home Internet connection to make it more secure.

geotagging When your exact location is added to a social media posting or digital photograph and then potentially shared with others online.

Google Chrome A popular web browser from Google that’s available for Windows PCs, Macs, and all popular smartphones and tablets.

IdentityTheft.gov A website operated by the Federal Trade Commission that’s designed to help educate people about identity theft and help people who are victims of identity theft to report the incident and recover from it with the least amount of financial damage possible.

identity theft When someone uses your personal information (such as your name, address, date of birth, and/or Social Security number) to impersonate you. This might be done to steal your money, misuse your credit cards, steal your Social Security benefits, or take advantage of your health insurance benefits, for example.

identity theft protection An online-based service that monitors your credit reports and other databases that can alert you of potential identity theft as it’s happening (or shortly thereafter), allowing you to stop it before too much damage is done.

Internet service provider (ISP) The company that provides you with Internet service in your home or office.

malware Like a computer virus, this is software that is installed onto your computer or mobile device that’s designed to steal information and/or cause damage to your equipment and/or data.

man-in-the-middle attack When a hacker intercepts data being sent from your computer or mobile device to the Internet (or that’s received from the Internet), and uses the information to perpetuate identity theft or a cybercrime. Using a virtual private network (VPN) is an easy way to prevent this type of online crime and privacy invasion.

metadata As it relates to digital photography, metadata is information that is stored with each digital image file. It contains information about the image. This might include the date, time, and location the photo was taken, who appears in the photo, and/or a text-based title, keyword(s), or caption.

Microsoft Edge The popular web browser developed by Microsoft that comes bundled with the Windows 10 (or later) operating system.

Mozilla Firefox An independently developed web browser that’s available for Windows PCs, Macs, and most smartphones and tablets.

parental controls The ability to limit what can be done when someone (such as a child) uses certain types of equipment, such as a computer, smart TV, DVR, video game system, smartphone, or tablet. Parents can set parental controls to prevent kids from accessing inappropriate content or from using specific features or functions built in to certain types of equipment.

passcode A numeric password, typically comprised of between four and six digits when used in conjunction with a computer, smartphone, or tablet.

password manager A database application that securely stores all of someone’s usernames and passwords (along with online payment details) related to websites and online services the person visits.

phishing scheme A type of cybercrime where the criminal impersonates a well-known business or organization and uses a scare tactic to get a potential victim to share personal information. For example, you might receive an official-looking email from what you’re led to believe is your bank. The email will state there’s a serious problem with your account and encourage you to click an embedded link, call a phone number, or immediately provide information to “fix” the problem.

pop-up blocker A feature built in to a web browser (or that can be added using an optional plug-in) that prevents websites from displaying annoying pop-up windows while you’re surfing the Internet.

privacy settings As it relates to social media activity, the privacy settings available for your account allow you to determine who will be able to see your postings and track your online activities. Adjusting the privacy settings associated with your Facebook account, for example, can also help determine the types of online ads you see, and what information can be tracked.

public Wi-Fi hotspot A Wi-Fi hotspot that’s available to the public in an airport, hotel, café, library, school, or restaurant, for example. A public Wi-Fi hotspot tends to be less secure than an Internet connection set up in your home or at your work. For added protection, set up a virtual private network (VPN) from the computer or mobile device you’re using when you connect to a public Wi-Fi hotspot.

Safari The web browser developed by Apple that comes bundled with all Mac computers and all iPhones and iPads.

secure password A password that is designed to be difficult for someone else (such as a hacker) to figure out. For example, a secure password should be at least six characters long, combine letters and numbers, use upper- and lowercase letters, and/or special characters, such as punctuation marks (! or .), dashes (-), or underscores (_).

security freeze One of the tools available from the credit reporting agencies that will prevent anyone from accessing your credit reports or being able to acquire loans or credit in your name or using your identity.

smart appliance Any equipment or device in your home that’s able to connect to your home’s wireless Internet service and then be controlled remotely from your computer, smartphone, or tablet.

social media Online-based services, such as Facebook, Twitter, Instagram, SnapChat, and LinkedIn, that allow people to share information and communicate using their computer, smartphone, or tablet.

social media account profile The information you provide to a social media service that’s displayed as part of your public profile. This information can be seen and accessed by other users, as well as online advertisers.

two-factor authentication A way to add an added level of security to your online accounts. Each time you attempt to sign in to a specific website or online service, in addition to your username and password, you’ll need to provide a one-time-use code that is emailed or sent to you via text message.

Virtual private network (VPN) A security tool that’s used to encrypt and protect information as it gets transferred from your computer or mobile device to a modem or router (and ultimately sent or received via the Internet).

virus Like malware, this is software that gets installed onto your computer or mobile device that’s designed to steal information and/or cause damage to your equipment and/or data.

virus/malware protection software This is specialized software that continuously monitors your computer or mobile device in an attempt to keep unwanted viruses or malware from being downloaded and installed. This software can also typically be used to remove viruses or malware that have infected a computer or mobile device.

web browser plug-ins This is optional software that is installed in conjunction with a web browser to add features to that web browser. Plug-ins can provide additional security, streamline certain web surfing-related activities, or add specialized functionality to a web browser.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset