| A | B |
| Authenticated | Checked and verified as real or legitimate. |
| Code of Conduct | A policy that defines the behavior expected of all employees. |
| Confidentiality | A legal and ethical principle that prevents the disclosure of secret information to authorized parties. |
| Encryption | Scrambling so as to be indecipherable |
| Ethical | Conforming to accepted standards of social or professional behavior |
| Firewall | Software or hardware that monitors information as it passes from a network to your computer to detect malicious programs |
| Integrity | Adherence to a strict moral or ethical code. |
| Password | A string of characters used to authenticate the identity of a user, and to limit unauthorized access. |
| Phishing | A method of tricking computer users into divulging private or confidential information over the internet |
| Unethical | Not conforming to accepted standards of social or professional behavior |
| Virus | A malicious computer program designed to cause damage to a computer system. |
| Worm | A self-replicating program designed to cause damage to a computer system |
| Form | A document used to collect and organize information |
| Digital Signature | An electronic, encryption-based, secure stamp of authentication on a macro or document. |