| A | B |
| Encryption | The translation of data into secret code - most effective way to achieve data security. |
| Antivirus Software | An application designed to search for viruses and repair files on a computer. |
| Bomb | A destructive computer virus that has a trigger to act based on a predetermined event or date. |
| SPAM | Electronic junk mail - unsolicited email. |
| Computer Virus | A computer program designed to damage computer files. |
| Cyber Crime | Any criminal act dealing with computers and networks (called hacking). Additionally, it also includes traditional crimes conducted through the Internet. (Hate crimes; identify theft, Internet fraud, etc.) |
| Computer Ethics | The standards of honesty, morality, and fairness as related to computers. |
| Firewall | Technology that prevents users from visiting inappropriate web sites and protects the network from unauthorized users. |
| Trojan Horse | A type of computer virus that is disguised as a useful application. |
| Worm | A computer program that can reproduce itself. It is designed to damage computer files. |
| Freeware | Software that is given away free of charge, but who's author still has the copyright. |
| Hacking | The unauthorized use or access to a computer system or computer files. |
| Hoax | A program intended to scare users into thinking they have a computer virus. Carries the same punishment as actually sending a Computer Virus. |
| Spyware | Any software that secretly gathers user information through the user's Internet connection without their knowledge. |
| Malware | Short for malicious software, software designed specifically to damage or disrupt a system, such as a virus or a Trojan horse. |
| Identity Theft | Stealing another peron's personal information (name, Social Security number, credit card number, etc. |
| Password | A secret series of characters that enables a user to access a file, computer, or program and provides security and protection from others accessing your information. |
| Phishing | Act of sending an email to a user in an attempt to scam the user into surrendering private information. |
| Shareware | Software that can be tried before you purchase. |
| Netiquette | The rules of etiquette that apply when communicating over computer networks |