What is E-Safety?

E-safety can cover a wide variety of issues and topics, sometimes more than you'd think!

Click here for our helpful glossary of terms - and what they mean.

Browse the glossary using this index

Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL

Page: (Previous)   1  2  3  4  5  6  (Next)



Bitcoins are a virtual or digital currency that can be used as a form of online payment. Created, traded and used entirely on the Internet, the system is managed by a software algorithm and can be used internationally.

However, the scheme has already been expolited by hackers, and there are doubts about how stable or lasting the scheme will be.


A blog is an online journal, which is updated frequently or daily with posts that can be about any topic. They can be created by anyone, from large companies and websites, to small groups and individuals.

They are informal written pieces, sometimes containing multimedia content, and can contain personal opinion, feelings and views. They also generally allow readers and other bloggers to respond or reply to the post, in an open stream where conversations take place between the blogger and other commentators.

Blogging can be a great way to establish a positive digital identity, to promote your work and your skills, and even make money and network with other professionals in your field of expertise. However, you also need to be mindful of what information you're sharing, and how you're representing yourself.
 Bloggers can also attract negative individuals who write derogatory, hateful comments (for more on this, please see the Cyberbullying and Trolling entries).

To discover the basics of starting and writing a blog, please click here

To find out more about blogging safely, please click here


This term describes a group of otherwise unrelated PC's which have all been infected by the same virus, which allows them to be centrally controlled and manipulated by criminals or hackers for their own purposes.

To find out more about securing your PC or device from viruses, please click here

Buying Tickets Online

Buying tickets for entertainment and sporting events, festivals, gigs and shows online can be a fantastic way to beat the queues and get a number of tickets at the same time. Official websites often become overwhelmed with traffic - the number of people trying to buy tickets at the same time - and secondary sites offering tickets straight from the venue, sometimes at a cheaper price, can be tempting.

However, one in ten people in the Uk have been victims of online tickeing scams - here's how to make sure this doesn't include you. Click here for more information.



A catfish is someone who assumes a false identity in order to pursue an online relationship. The term comes from the 2010 film about a man who believes he is in a relationship with a young woman but discovers he is being hoaxed. A catfish may have many attractive pictures on their profile and accounts on popular social networking and deating sites. They aim to start an online relationship with someone that can be very intense and seem very personal, and in some cases can lead to identity theft, fraud and other scams.

For more information, please click here


The Child Exploitation and Online Protection Centre, which works to identify threats to children and young people - particularly involving sexual exploitation, grooming and abuse - and to act in order to stop and prosecute offenders.

You can report any of these activities, whether you're experiencing them yourself or are worried about a friend, at the CEOP website, by clicking the eye icon in the top right hand corner of the website. To visit the website, click here

Charity Donations

It's extremely quick and easy to support a number of terrific charities and causes online, and a fantastic way to help many worthy appeals and campaigns.

Sadly, criminals and fraudsters realise they can exploit the kindness and generosity of people who donate to these causes, and are skilful at doing this online. To find out how to protect against this type of scam, please click here


Clickjacking is where malicious coding is hidden beneath apparently legitimate buttons or icons, or under any clickable content on a website. This can happen on a legitimate website that's been hacked, or on a spoof version of a popular site, which users are tricked into using via links or emails.

The scam can take place on numerous browsers and uses varying techniques. It can be common on Facebook, especially when clicking to view video or picture content, and this can enable your account to be accessed - with false status updates and spam links being posted and your details stolen.

To find out more about online security, click here


Cloud computing is where software, programs and applications you would normally install on a regular PC or office system are instead delivered via the Internet. It's also known as "hosted software" or "hosted applications." You can also use cloud computing to rent space in a data centre and use their servers. The most popular use of Cloud computing is to provide online drives to save content, which can be accessible via any device as long as it has an Internet connection.

To find out more about using Cloud drives, please click here

Copycat Websites

Copycat websites are those offering services that are usually provided by an official body - e.g. the government or local council - but which are not official or legitimate.

They usually charge a premium rate for the services and offer no benefit to the customer. They use SEO (search Engine Optimisation) techniques and various tricks so that they achieve higher positions on search engines, often ranking them higher than the official site and making themselves look authentic with similar copycat design, font, and so on.

To find out more about avoiding copycat websites, please click here

Page: (Previous)   1  2  3  4  5  6  (Next)