| A | B |
| Black Hat Hacker | A person who breaks into a computer system with the purpose of inflicting damage or stealing data. |
| Cracker | A person who breaks into a computer system without authorization, whose purpose is to do damage (destroy files, steal credit card numbers, plant viruses, etc.). |
| Denial of Service | A condition in which a system can no longer respond to normal requests. |
| Encrypted Server/Browser | Use in order to protect against unlawful access to a user's credit card number |
| Fair Trade Act | Acts that deals with fraudulent sales. |
| Internet Tax Freedom Act | Proposed legislation that suggests the federal government mandate a 5% Internet tax on Internet commerce. |
| Interstate Commerce Act | Regulates shipment of products via surface transportation. |
| Millennium Digital Commerce Act | States that electronic commerce contracts are valid when signed electronically. |
| Pharming | Setting up a fraudulent Web site that contains copies of pages from a legitimate Web site in order to capture confidential information from users. |
| Phishing | a scam to steal valuable information such as credit card and social security numbers, user IDs and passwords. |
| Site Certificate | Verifies the host's identity to computers that access it. |
| Telecommunications Act | Preserves the vibrant and competitive free market that presently exists for the Internet and other interactive computer services. |
| Veri-Sign | A for profit organization that provides products that allow the web sites to transmit encrypted data and to authenticate the web site through the use of digital certificates. |