| A | B |
| Hacking | To gain access to a computer file or network without authorization |
| Hacker | A person who uses programming skills to gain illegal access to a computer network or file |
| Spyware | Any malicious software that is designed to take partial or full control of a computer's operation without the knowledge of its user. |
| Secure | Protected from danger or attack |
| Threat | Saying you want to hurt or destroy |
| Computer viruses | computer programs that can damage the documents, files, and software on your computer |
| Firewall | Security software that can block unauthorized access to your computer |
| Antivirus | A software program designed to identify and remove a computer virus |
| Antispyware | Software that detects and removes spyware from the computer |
| Spam | Junk mail |
| Harmful | Causing or capable of causing damage |
| Junk Mail | Unsolicited advertising or promotional material through the mail and Email |
| Scam | Is the use of elctronic messaging systems to send unsolicited messages |