| A | B |
| Security Patch | a fix to a program to close a security hole |
| Netizen | a person using the Internet to participate in online social communities |
| Malware | programming code to harm a computer |
| Security Hole | a flaw in the computer program |
| Social Engineering | general knowledge of human behavior to trick users |
| DoS | denial of service attack |
| Bot | a collection of remotely controlled by bots |
| Bot | a computer that has been compromised by a piece of code and controlled remotely |
| Blended Threat | a form of malware that includes more than one attack |
| Zero Day Attack | an attack takes advantage of a security hole |
| Trojan Horse | camouflage itself as something harmless |
| Variant | mutated form of a virus or worm |
| Script Kiddie | a low-talent hacker |
| Worm | a standalone malware that copies itself across networks |
| Signature | a unnique pattern of bits usued to identify a virus |
| Virus | a piece of code that copies itself |
| Phishing | trick users to reveal personal information |
| URL | Uniform Resource Locator |
| Mr Takumi | first teenager to be charged with phishing |
| Embedded Link | a link or web address in an email or web page |
| Shortened URL | users shorten a long URL address |
| Phishing Target | a website a phisher is trying to get your information |
| Spoofed Site | fake web site |
| Fake Screen | a screen that looks line an actual company website |