MS Information & Communication Technology / PhotoShop
Cyber Smart
This glossary will cover all relevant terms regarding Cyber Safety and being Cyber Smart that are covered in class.
Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL
H |
---|
HackerA Hacker can be good or bad; or in the middle. A good hacker, or a white-hat hacker, will be hired by security companies or banks and will every so often be assigned to crack one of their systems. If he succeeds, he tells the company the problems and they fix it. A bad hacker, or a black-hat, will crack others' information and use it to his benefit. This can be on multiple levels; some of the more severe ones will crack bank accounts, and some of the lesser ones will just obtain name, location, etc. The variant in the middle is a grey-hat hacker; this is a good hacker turned bad (and the other way around as well, really). They will be a combination of a worse white-hat and a worse black-hat hacker. |
Hackers and thiefsI whatched a program on youtube about hackers in the UK they are capable of putting you into dept by only knowing your full name. That's why it is very important not to put your personal information on social websites. Such as Facebook Twitter etc. |
HashingA process of applying a mathematical algorithm against a set of data to produce a numeric value. |
HoaxSome websites are very dangerous. I remember in Poland there was a website called pobieraczek.pl that allowed users to download music for 10 zl a month. Not only people downloaded viruses with the files but they had to pay 10 zl a month for downloading plain additonal packages. |
Social networks