| A | B |
| Online Predator | An individual who develops contact with Internet users, through chat rooms, online forums, or email, to exploit them financially or involve them in dangerous relationships |
| Password | A unique string of characters that a user types in as an identification code. This is a security measure used to restrict access to computer systems and sensitive files |
| Phishing | The act of extracting personal information, such as passwords and credit card details, from computer users and then use this information for malicious purposes |
| Plagiarism | The act of copying someone's work and using it as if it is your own work, without mentioning the source |
| Power Surge | A sudden increase in line voltage, which may lead to the damage of electronic devices, such as computers |
| Secure Sockets Layer (SSL) | An Internet security protocol that ensures secure data communication by encrypting the information transmitted |
| Sexting | The sending of sexually explicit photos, images, text messages, or e-mails by using a cell phone or other mobile device |
| Slander | Verbal Defamation |
| Software Piracy | Unauthorized copying of copyrighted software without obtaining the license or permission of its copyright owner |
| Spam | An irrelevant and unsolicited e-mail message sent by an unknown sender. This is sent to distribute a message to many recipients at one time |
| Spyware | A computer program that is installed on your computer without your knowledge. This can secretly send out information about your Web browsing habits or other personal details to another computer through the network |
| Trojan Horse | A destructive computer program disguised as a game, utility, or software. This does something harmful to the computer system while appearing to do something useful |
| Username | The name by which a user is identified to a computer system or network |