| A | B |
| Netizen | A citizen of cyberspace ) i.e the internet). Anyone who uses the nternet |
| Malware | Programming codes designed to harm a computer or it's data. |
| Viruses | A programming code that copies itself to take up your memory and do harm to your computer and data. It attaches itself to a file. A self-replicating program. |
| Worms | Malicious program that travels from computer to computer, usually through networks, copying itself over and over; can overload computers and networks. |
| Trojans | A program that comouflages itself as a friendly download, but when opened creats a backdoor that allows someone else to control your computer. |
| Bot Armies | A large number of hacked computers controlled by a hacker to infect other computers. |
| Keystroke Loggers | A program that keeps track of the computer user's keystrokes as they type in their computer. |
| Spyware | A computer program that monitors your computer usage without your knowledge. |
| Adware | A program that delivers target advertising to a user based on information secretly gathered from the users compuiter, such as websites visited and searches preformed. |
| Scareware | Also known as Rouge Security Software. Applications that trick users into downloading malicious software disguised as computer security software. |
| Ransomware | A program where a users data or internet connection is encrypted or disabled unless the user pays a fee. |
| Rouge Security Software | Also known as Scareware. Applications that trick users into downloading malicious software disguised as computer security software. |
| Security Holes | Any flaw in a program that makes your computer vunerable to attacks. |
| Security Patch | A fix to a program to close a specific security hole, no longer making your computer vunerable. |
| Firewall | Hardware device or program that prevents unwanted access and blocks unwanted programs like viruses from entering a network. |
| Antivirus | A program that protects a computer from viruses. |
| Spyware Protection | A program that protects a computer from spyware programs. |
| Signature | A unique pattern of bits that allow an antivirus program identify viruses |
| Denial of Services (DoS) | Flooding a website with lots of bogus connections denying other legitimate users access. |
| Payload | A subset of instructions attached to a virus to create havoc on one's computer. |
| Mutations | Also called variants. Slight changes to a virus so it will not be recognized by an antivirus program. |
| Script Kiddie | A low-talented hacker |
| Zero Attack | An attack from a not-yet-known virus where a patch as not yet been created. |
| Blended Attack | A form of malware that includes many forms of attack(e.g. an attack, worm and trojan) |
| Bot | Also called a zombie. A computer that was attacked by a hacker and can be used to controlled by the attacker remotely. |
| Bot Networks | A collection of Bots that can be used as a massive attack. |
| Social Engineering | The study of human behavior to trick people into breaking their own security rules (e.g. opening an infected e-mail) |
| Drive by downloads | A program downloaded without you knowledge when you visit a website. |
| Data Grabbers | Software that collect information about you, such as spyware, adware, and keyboard loggers. |
| End User Licensing Agreements | EULA's are the details you agree to when you intstall or download a program. |
| Peer to Peer Networks | P2P networks are sites that allow a user to share files with other people (e.e Napster, Kazaa, Limewire) |
| Malvertising | Malware that pops up on reputable sites. |
| Black Hat SEO | Using irrelevant keywords for your site so it will so up on nonrelated searches. |