• Reputation Protection Attorneys

    Reputation Protection Attorneys

  • 1

Reputation Management Terms & Definitions

There are 88 entries in this glossary.
Search for glossary terms (regular expression allowed)
Term Main definition
Any Internet-related illegal activity.
the repeated use of electronic communications to harass or frighten someone, for example by sending threatening emails.
An elaborate handshake that typically involving slapping palms, bumping fists, or snapping fingers.
Dark web
The dark web is made up of sites that are not indexed by Google and are only accessible through specialty networks such as Tor (see below). Often, the dark web is used by website operators who want to remain anonymous. Everything on the dark web is on the deep web, but not everything on the deep web is on the dark web.
An AI-based technology used to produce or alter video content so that it presents something that didn't, in fact, occur.
the action of damaging the good reputation of someone through slander or libel.
"she sued him for defamation"
Denial of Service Attacks
A denial-of-service (DoS) is any type of attack where the attackers (hackers) attempt to prevent legitimate users from accessing the service. In a DoS attack, the attacker usually sends excessive messages asking the network or server to authenticate requests that have invalid return addresses.
Synonyms - DOS Attacks
Digital Footprint
On the Internet a digital footprint is the describes the trail, traces or "footprints" that people leave online on different sites.
DNS (Domain Name System) is a large database of domain names.  The purpose is to look up a domain and its correspondent Internet (IP Addresses). 

For example: www.expertwebprofessionals.com corresponds to it's unique number
Synonyms - Domain Name System
Search for and publish private or identifying information about (a particular individual) on the Internet, typically with malicious intent.
Synonyms - Doxing
Electronic Footprint
computers maintain a record of all website visits and e-mail messages, leaving a trail of the user’s activity in cyberspace. These data can still exist even after the browser history has been cleared and e-mail messages have been deleted.
Encryption and authentication helps ensure that data transmitted over the internet remains secure and protected from possible interception. Authentication ensures that both parties are legitimate, while encryption encodes the data in such a way that it can not be decoded by an unauthorized third party.
For sure
A security system consisting of hardware and software used to block hackers, malware, viruses, and other threats to a computer or computer network.
To engage in an online argument usually involving unfounded personal attacks by one or more parties.
Gamer tag
The nickname a user has chosen to be identified by when playing Internet games.
Graymail refers to unwanted email messages that do not otherwise meet the criteria of spam. Typically, graymail consists of emails from entities with whom the user has registered or signed up for regular email notifications. Graymail often includes newsletters, mailing lists and membership announcements, and forum updates.
Internet gamers that intentionally cause problems or cyberbully other gamers.
This refers to techniques by sexual predators to get to know and seduce their victims in preparation for sexual abuse.
GTG means Got to go.