| A | B |
| Firewalls | Are connected between two or more networks. One may be the internet. Maybe installed as software on the computer. It listens to and inspects traffic entering the computer. It determines if the traffic is authorised or not. It helps to prevent hackers from accessing to destroy or steal information, eg, credit card info, logins. Uses rules determined by software, system, or user. |
| Data theft | Can be done by a memory stick, mp3 player. |
| Virus | Is a small program created on purpose to disrupt your computer. |
| Virus Transmission | can happen by receiving or downloading an infected file and running it on your computer. |
| Virus Scanning | Checks your computer for viruses that it knows about since the last update. |
| Virus Scanning Update | must be kept up-to-date regularly to be aware of all new viruses as they are released. If you haven't updated your virus scanning software, it won't know about viruses that were released yesterday for example! |
| Transferring a virus | Plugging in hardware such as a flashdrive containing a virus. |
| Anti-Spam Software | Is used to prevent unwanted messages which could contain potentialy a virus. Tends to be used for email messages and scan incoming mail. |
| Examples of viruses include | Trojans, spyware, and adware. They run silently in the background. |