| A | B |
| Biometric Security Measures | A technique or device that examines a fingerprint, voice pattern, or the iris or the retrina of the eye. |
| Filtering | A process that can be used to cut down or eliminate most junk mail. |
| Fraud | Something intended to deceive; deliberate trickery intended to gain an advantage. |
| Hoax | An attempt to deceive an audience into believing that something false is real. |
| Logic Bomb | Computer virus triggered by the appearance of disappearance of specified data. |
| Netiquette | Refers to good manners and proper behavior when communicating through electronic mail. |
| Phishing | Type of personal information scams. |
| Pyrmaid Schemes | An illicit business model where profits are based on the investors' ability to recruit more individuals who are enrolled to make payments to their recruiters. |
| RDF Summary | A format orginally developed to facilitate the syndication of news articles. |
| Tagging | The practice of adding keywords to content to simplify searching. |
| Teleconferencing | Telecommunication service in which parties in remote locations can participate via telephone in a group meeting. |
| Time Bomb | Computer virus that does not cause its damage until a certain date or until the system has been booted a certain number of times. |
| Trojan Horse | Computer virus that does something different from what it is expected to do. |
| Urban Legend | A story which could have been partially true, but has grown from constant retelling into a mythical yarn. |
| Virus | A computer program that is written to cause corruption of data. |
| Worm | Computer virus that makes many copies of itself, resulting in the consumption of system resources that slows down or actually halts tasks. |