| A | B |
| Hacking | To gain access to a computer file or network without authorization |
| Hacker | A person who uses programming skills to gain illegal access to a computer network or file |
| Spyware | Any malicious software that is designed to take partial or full control of a computer's operation without the knowledge of its user. |
| Secure | Protected from danger or attack |
| Threat | Saying you want to hurt or destroy |
| Computer viruses | computer programs that can damage the documents, files, and software on your computer |
| Firewall | Security software that can block unauthorized access to your computer |
| Antivirus | A software program designed to identify and remove a computer virus |
| Antispyware | Software that detects and removes spyware from the computer |
| Cache Memory | The files stored in the memory record information about the web pages you visit |
| Cookies | provide a way for the Web site to recognize you and keep track of your preferences |
| Online Scammers | a person who creates a scam online. |
| Spam | Junk mail |
| Harmful | Causing or capable of causing damage |