| A | B |
| Attribute | Classifications associated with files that determine how the files can be viewed or edited. |
| Authentication | The process of verifying the identity of someone logging onto a network. |
| Biometrics | A method of identifying a person by using biological methods such as fingerprints, retinal scans, and voice. |
| Cookie | Information placed on a user's hard drive to track things such as shopping habits and preferences. |
| Cracker | A person who breaks into computer systems or software with out permission and with intent to do harm. |
| Cryptography | The study of encryption. |
| Decryption | The process of converting scrambled data back into the original form so that it can be understood by the receiver. |
| Digital Certificate | Identification issued by a trusted third party. |
| Encryption | The process fo turning ordinary data into a coded message. |
| Firewall | Software or hardware used as a security device to prevent unauthorized users or information from transferring information to or from the network. |
| Full Control | Permission that can modify, take ownership of, and assign other users permission to the file or folder. |
| Hacker | A programmer. |
| Handshake | The process of network devices communicating to synchronize transmission with each other. |
| Intranet | A computer network that is privately maintained by an organization so that authorized persons can access it. |
| Keylogger | A program that records everything typed in on a keyboard. |
| List Contents | permission that allows the user to view files and folders but not modify it or the attributes or even view the attributes. |
| Macro | Virus that acts upon spreadsheet or word processor application. |
| Malware | Malicious software that distrubs normal computer operations or gathers personal data to give it out to unauthorized people over the Internet. |
| Modify | Permission of files or folders to be able to change or delete. |
| Patch | Small program that is written to fix or update another program. |
| Ping | A troubleshooting tool used to verify connectivity to network resources. |
| Raid | Using multiple hard drives to improve performance or for fault tolerance. |
| Service Pack | Software patch that is installed to an application or operating system. |
| Social Engineering | illegally entering computer systems by getting people to reveal IDs, paswords, and other confidential information. |
| Spam | Junk, unsolicited e-mail. |
| Threat | Forewarning of an attack on a computer system. |
| Trojan Horse | program that presents itself as something legitimate but may have destructive intents. |
| Virus | Program designed to copy itself into other programs stored on a computer. |
| Virus Definition Files | Contain patterns to identify viruses and must be kept up to date in order to identify newly created viruses... |
| Vulnerability | A weakness in software or hardware that may results in the system, data or applications being at risk. |
| Worm | A malicious program that replicates itself to fill a hard drive or storage space. |
| Write | Permission to a file or folder to add files or make changes to them but not delete them. |