Shortcuts:.

Share Safely:.

To be on the safe side, keep the following things in mind when using a public computer or network:

Devices
Protect your Devices
Public computers can have a lot more malware on them. If you must plug your own device into a public computer, be sure to scan it with anti-virus software afterwards.

Personal Information
Protect your Information
Public networks are not always secure and you never know if someone is spying on the information you send. Avoid entering or viewing any personal information, even passwords, on a public computer or network.

If you absolutely have to log in to an account, change your password once you are back on a secure computer.

Trash
Leave Nothing Behind
Don't let the computer store any of your information, delete your files, clear the browser cache and history, and empty the trash before you walk away.

Snooping Eyes
Avoid Snooping Eyes
Some people can't help looking at other people's computer monitors. If you're doing something you don't want other people to see, don't do it on a public computer.

Wash Your Hands
Wash Your Hands
Who knows how many people have touched that computer before you or how dirty their hands were! After using a public computer, wash your hands!

Welcome to the Carnegie Cyber Academy Library! Here you will find useful resources for cyber defense and web research, all nicely organized by Maya, the Academy's librarian. You can also find tips for using the Web effectively for research, shopping and fun.

Using the Web for Research

The Internet can be a great resource as long as you know how to use it. Here you will find tips for effective web research to help you get the most out of the Internet and separate the worthwhile information from the worthless.

Maya Searching

Searching for Resources
Tips for searching for Web resources effectively.

Maya Evaluating

Evaluating Source Credibility
Tips for determining if a web resource is credible.

Maya Using

Using Web Resources
Tips for using web resources appropriately and correctly.

Cyberpedia

Sometimes training for cyber defense is like learning a new secret language. Good thing Maya keeps this encyclopedia of cyber defense terms handy:

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

L

[+] L33tspeak

[+] LAN

[+] Link

[+] LOL

M

[+] Mail Server

[+] Malicious Search Results

[+] Malware

[+] Man-in-the-Middle Attack

[+] Megabyte

[+] Memory Leaks

[+] Microblogging

[+] Microprocessor

[+] Misinformation

[+] Misleading Applications

[+] MMOG

[+] Mobile Device

[+] Mobile Hotspot

[+] Modem

[+] Moderator

[+] Motherboard

[+] .MP3

[+] MP3 Player

[+] Multimedia

N

[+] National Cybersecurity Awareness Month

[+] .NET

[+] Netiquette

[+] Net Neutrality

[+] Network

[+] Network Interface Card

[+] Network Sabotage

[+] Non-Renewable Resources

[+] No-Mo-Phobia

O

[+] Offline Identity

[+] Online Identity

[+] Online Reputation

[+] .ORG

[+] OS

P

[+] P2P Network

[+] Packet

[+] Packet Sniffer

[+] Parental Controls

[+] Password

[+] Patch

[+] PDA

[+] Peer-to-Peer Network

[+] Peripherals

[+] Permalink

[+] Personal Information

[+] Personal Information Filter

[+] Pharming

[+] Phishing

[+] Phishing Filter

[+] Photo Sharing Website

[+] Ping

[+] Pixel

[+] Plagiarism

[+] Plug-In

[+] Pop-up

[+] Pop-up Blocker

[+] Privacy Settings

[+] Profile

[+] Proxy Server

Q

[+] Quarantine

R

[+] RAM

[+] Remote Backup

[+] Rogue iFrames

[+] Rogue Security Software

[+] Router

[+] RSI

[+] RSS

S

[+] SAM

[+] Satellite

[+] Scam

[+] Scareware

[+] Screenname

[+] Script Kiddie

[+] Scrolling

[+] Search Engine

[+] Server

[+] Server, Mail

[+] Server, Proxy

[+] Server, Web

[+] Shareware

[+] Slang

[+] Smartphone

[+] SMS

[+] Social Engineering

[+] Social Networking Site

[+] Software

[+] Sound Card

[+] Spam

[+] Spam Filter

[+] Spoiler

[+] Spyware

[+] Surge Protector

T

[+] Tablet PC

[+] Tag

[+] Technotrash

[+] Terms of Use

[+] Text Message

[+] Thumb Drive

[+] Toxic

[+] Trojan Horse

[+] Troll

[+] Trusted Adult

U

[+] Unsafe Form

[+] Upload

[+] URL

[+] USB

[+] USB Flash Drive

[+] Username

V

[+] Vampire Power

[+] Vaporware

[+] Video Chatting

[+] Video Networking Site

[+] Virus

[+] Voice Chatting

[+] VOIP

[+] Vulnerabilities

W

[+] Web 2.0

[+] Web Browser

[+] Web Browsing

[+] Webcam

[+] Web Page

[+] Web Search

[+] Web Server

[+] Website

[+] Website Vandalism

[+] Web Surfing

[+] Weirdo Stranger

[+] White Hat Hacker

[+] WiFi

[+] WiFi Hotspot

[+] Wish list

[+] Wireless

[+] World Wide Web (WWW)

[+] Worm

X

Y

Z

[+] Zero Day Attack

[+] ZIP File

[+] Zombie Computer

 

A

[+] Acronym

[+] Adware

[+] Alias

[+] Anonymous

[+] Anti-Malware Software

[+] Anti-Spyware Software

[+] Anti-Virus Software

[+] App

[+] Archive

[+] Attachment

[+] Avatar

[+] Away Message

B

[+] Backup

[+] Backlink

[+] Bandwidth

[+] Banner Ads

[+] Bias

[+] Biodegradable

[+] Bit

[+] Bitmap

[+] Black Hat Hackers

[+] Blog

[+] Blu-Ray

[+] Bookmark

[+] BotNet

[+] BRB

[+] Broadband

[+] Browser

[+] Browser Compatability

[+] Browser Hijacker

[+] Buddy List

[+] Buffer

[+] Bug

[+] Bulletin Board

[+] Byte

C

[+] Carbon Emissions

[+] CD

[+] Chat Room

[+] Chat Slang

[+] Cheating Software

[+] Children's Online Privacy Protection Act (COPPA)

[+] Cloud Computing

[+] Cold Shoulder

[+] .COM

[+] Content Filters

[+] Cookie

[+] Copyright

[+] Copyright Infringment

[+] CPU

[+] Credibility

[+] Cyber Bully

[+] Cyber Bullying

[+] Cyber Crime

[+] Cyber Crime Units

[+] Cyber Criminal

[+] Cyber Defender

[+] Cyber Forensics

[+] Cyber Monday

[+] Cyber Piracy

[+] Cyber Predator

[+] Cyber Squatting

[+] Cyber Stalking

[+] Cyber Villain

[+] Cyber Woozling

[+] Cyberspace

D

[+] Data Compression

[+] Data Rot

[+] Defamation

[+] Defragmenting

[+] Denial-of-Service Attacks

[+] Device Driver

[+] Dial-up

[+] Disclaimer

[+] Domain

[+] Domain Name

[+] Download

[+] DSL

[+] DVD

E

[+] E-commerce

[+] .EDU

[+] Ego Surfing

[+] Email

[+] Email Address

[+] Email Bombing

[+] Emoticon

[+] Encryption

[+] Environmental Impact

[+] E-Reader

[+] Ethernet

[+] Extortion

F

[+] Fiber Optics

[+] File

[+] File Attachment

[+] File Compression

[+] Firewall

[+] Flag

[+] Flame War

[+] Flaming

[+] Form

[+] Forum

[+] Forum Troll

[+] Fraud

[+] Freeware

[+] Friends List

[+] FTP

G

[+] .GIF

[+] Gigabyte

[+] Global Warming

[+] Gold Farmers

[+] .GOV

[+] Graphics Card

[+] Green Computing

[+] Greenhouse Gasses

[+] Greenwashing

[+] Grey Hat Hacker

[+] Griefer

[+] GUI

H

[+] Hacker

[+] Hacker, Black Hat

[+] Hacker, Grey Hat

[+] Hacker, White Hat

[+] Hacking

[+] Hard Drive

[+] Hardware

[+] Hoax

[+] Home Page

[+] Host

[+] HTML

[+] HTTP

[+] HTTPS

[+] Hyperlink

I

[+] Icky Feeling

[+] Icon

[+] Identity Theft

[+] Insider Attack

[+] Instant Messaging

[+] Internet

[+] Internet Addiction

[+] Internet Fraud

[+] Intranet

[+] Intrusion

[+] ISP

[+] IP

[+] IP Address

[+] IP Spoofing

J

[+] Jailbreaking

[+] Joke Programs

[+] .JPEG

K

[+] Key Logger

[+] Keyword

[+] Kilobyte