Tech Vocab Slideshow Quarter 4 By: Jordan McCamman.

17
Tech Vocab Tech Vocab Slideshow Slideshow Quarter 4 Quarter 4 By: By: Jordan McCamman Jordan McCamman

description

Cyber Stalking Cyber Stalking- Sending multiple messages like via to annoy, embarrass, threaten, or intimidate the person Cyber Stalking- Sending multiple messages like via to annoy, embarrass, threaten, or intimidate the person It can be very scary if someone was cyber stalking you and not leaving you alone. It can be very scary if someone was cyber stalking you and not leaving you alone.

Transcript of Tech Vocab Slideshow Quarter 4 By: Jordan McCamman.

Page 1: Tech Vocab Slideshow Quarter 4 By: Jordan McCamman.

Tech Vocab Tech Vocab SlideshowSlideshowQuarter 4Quarter 4By:By: Jordan McCamman Jordan McCamman

Page 2: Tech Vocab Slideshow Quarter 4 By: Jordan McCamman.

Identity TheftIdentity Theft Identity theft - Stealing someone’s Identity theft - Stealing someone’s

identityidentity

Identity theft is wrong and you can go Identity theft is wrong and you can go to jail for itto jail for it

Page 3: Tech Vocab Slideshow Quarter 4 By: Jordan McCamman.

Cyber StalkingCyber Stalking• Cyber Stalking- Sending multiple Cyber Stalking- Sending multiple

messages like via e-mail to annoy, messages like via e-mail to annoy, embarrass, threaten, or intimidate the embarrass, threaten, or intimidate the personperson

• It can be very scary if someone was It can be very scary if someone was cyber stalking you and not leaving you cyber stalking you and not leaving you alone.alone.

Page 4: Tech Vocab Slideshow Quarter 4 By: Jordan McCamman.

Spam

Spam- A type of commercial message that people can get through pop-ups and e-mail, almost everyone gets spam

If you are going to your e mail account there is a section labeled spam

Page 5: Tech Vocab Slideshow Quarter 4 By: Jordan McCamman.

Child PornographyChild Pornography Child Pornography- pornography or Child Pornography- pornography or

pictures of people under the age of 18pictures of people under the age of 18

Child pornography is illegal and is against Child pornography is illegal and is against cyber lawscyber laws

Because of the sensitive nature of this Because of the sensitive nature of this vocabulary word I am not going to put a vocabulary word I am not going to put a picture in this slidepicture in this slide

Page 6: Tech Vocab Slideshow Quarter 4 By: Jordan McCamman.

Cyber BullyingCyber Bullying

Cyber Bullying-Cyber Bullying- the use of the internet the use of the internet and other technology devices to harm and other technology devices to harm people mentally( includes but not limited to people mentally( includes but not limited to name calling, threats and harassment)name calling, threats and harassment)Many states have laws against cyber Many states have laws against cyber bullying but there's no way to actually stop bullying but there's no way to actually stop it from happening it from happening

Page 7: Tech Vocab Slideshow Quarter 4 By: Jordan McCamman.

Hacking Hacking • Hacking-Modifying a computer hardware and

software to accomplish a goal and it is illegal

• Unlike the rest of the hackers who get caught, a good hacker doesn’t get caught.

Page 8: Tech Vocab Slideshow Quarter 4 By: Jordan McCamman.

SpywareSpyware Spyware – Computer software that obtains Spyware – Computer software that obtains

information without the computer owners information without the computer owners knowledge or permissionknowledge or permission

One way to know if theres spyware on One way to know if theres spyware on your computer is by running computer your computer is by running computer scans with your ant- spyware softwarescans with your ant- spyware software

Page 9: Tech Vocab Slideshow Quarter 4 By: Jordan McCamman.

MalwareMalware Malware- Designed programs to Malware- Designed programs to

infiltrate a computer without the infiltrate a computer without the owners acceptance owners acceptance

Malware is Malicious Software.Malware is Malicious Software.

Page 10: Tech Vocab Slideshow Quarter 4 By: Jordan McCamman.

Sexting

Sexting- Sending naked pictures via text message

Sexting is illegal and to do it with a minor is also child pornography

Page 11: Tech Vocab Slideshow Quarter 4 By: Jordan McCamman.

Pharming Pharming – A way hackers attempt to

penetrate your computer

To protect yourself from pharming you need a top of the line firewall

Page 12: Tech Vocab Slideshow Quarter 4 By: Jordan McCamman.

PhishingPhishing►Phishing- captures peoples information by Phishing- captures peoples information by

having people visit fake websites and suchhaving people visit fake websites and such

►You can be loosing your personal You can be loosing your personal information when visiting websites and information when visiting websites and you will have no idea that its happeningyou will have no idea that its happening

Page 13: Tech Vocab Slideshow Quarter 4 By: Jordan McCamman.

Computer FraudComputer Fraud

Computer Fraud- stealing someone's Computer Fraud- stealing someone's personal information and using itpersonal information and using it

Computer fraud is illegal and is very wrongComputer fraud is illegal and is very wrong

Page 14: Tech Vocab Slideshow Quarter 4 By: Jordan McCamman.

GeotagsGeotags Geotags- A way to ad geographical data to Geotags- A way to ad geographical data to

photos, RSS feeds, and websitesphotos, RSS feeds, and websites

I added a geotag to a picture on facebookI added a geotag to a picture on facebook

Page 15: Tech Vocab Slideshow Quarter 4 By: Jordan McCamman.

VirusVirus Virus-Virus-A virus is a treat on your A virus is a treat on your computer that can do varius harm to computer that can do varius harm to your computeryour computer

A type of bad virus is the Trojan A type of bad virus is the Trojan Horse because in order to get rid of Horse because in order to get rid of it you must to reformat your it you must to reformat your computer loosing all the informationcomputer loosing all the information

Page 16: Tech Vocab Slideshow Quarter 4 By: Jordan McCamman.

Cyber TerrorismCyber Terrorism – The use of internet based attacks in terrorism activities

Washington says the China has invested in cyber terrorism

Page 17: Tech Vocab Slideshow Quarter 4 By: Jordan McCamman.

The EndThe End

By: Jordan McCammanBy: Jordan McCamman

Thanks to help from Thanks to help from www.chacha.com the best www.chacha.com the best

search engine ever search engine ever