| A | B |
| Biometric Security System | Exsmine a fingerprint, voice pattern, or the iris or retina of the eye |
| Computer Crime | Criminal act committed through the use of a computer, such as getting into someone's else' system and changing information or creating a computer virus |
| Computer Fraud | Manipulation of a compute or computer data to obtain money, property, or value dishonestly or to cause a loss. |
| Data diddling | Act of changing data before it is entered in the computer or after it has been entered |
| Hacking | Invading someone else's computer, usually for personal gain or simply for the satisfaction |
| Identify Theft | The crime of obtaining someone else's personal data and using it for financial gain or to defraud or deceive |
| Logic Bond | Computer virus triggered by the appearance or disapperance of specified data |
| Software Piracy | The illegal copying or use of computer programs |
| Time Bomb | Computer virus that does ot cause its damange until a certain date |
| Trojan Horse | Computer virus that does something different from what it is expected to do |
| Vrius | A computer program that is written to cause corruption of data |
| Worm | Computer virus that makes many copies of itself, resulting in the consumption of system resources that slows down or actually halts tasks. |