| A | B |
| Security | the steps a computer owner takes to prevent unauthorized use of or damage to the computer |
| Malware | a broad term that describes any program that is intended to cause harm or convey information to others without the owner's permission |
| Virus | a program that tells your computer to perform destructive activities |
| Antivirus software | a program that searches executable files for sequences of characters that may cause harm and then disables those commands |
| Spyware | programs that track a computer user's Internet usage and sends this data to the one that created it |
| Firewall | hardware or software that prevents other computers on the Internet from accessing another computer without the owner's permission |
| Spoofed site | a web site set up to look exactly like another website but which is not legitimate |
| Phishing | the practice of sending emails to customers of a legitimate business asking them to click on a link that leads to a spoofed site |
| Pharming | when a criminal breaks into an DNS server (used to direct Internet traffic) and redirect attempts to access a legitimate site to a spoofed site |
| URL | web address |