| A | B |
| Black hat | Bad hacker who creates malicious programs to break into computers |
| Firewall | Hardware device or program that prevents unwanted access |
| Phishing | E-mail attack or scam designed to gather information from a user |
| Spoofing | When someone presents themselves as someone else in order to |
| Spyware | A software program that monitors your computer usage without your knowledge. |
| Strong password | Password with at least eight characters containing a mixture of |
| Virus | A piece of code that makes copies of itself. |
| Weak password | Password that contains anything that could be easy to guess, |
| Worm | A program that copies itself from one network to another. |
| Netizen | A citizen of cyberspace; any person using the Internet to participate in online social communities. |
| Malware | A piece of malicious code developed to harm a computer or its data. |
| Security Patch | A fix to a program to close a known security hole. |
| Trojan horse | Camouflages itself as something harmles or desirable. |
| Adware | A program that delivers targeted advertising content to users often by gathering information from a user's computer about what that person does online and which websites are visited. |