| A | B |
| Netizens | participates online social communities |
| Malware | code to harm computer or data |
| Security hole | a flaw in the computer program |
| Security patch | to close a security hole |
| Data Grabbers | collects information about you |
| Spyware | monitors your computer usage |
| Adware | delivers targeted advertising content |
| Keyboard loggers | keeps track of every keystroke |
| Malvertising | advertising rogue security on reputable sites |
| Ransomware | files encrypted until ransom paid |
| Hacker | breaks into a computer system without permission |
| Cyber-terrorist | computer attack to commit act of terrorism |
| Computer forensics | collecting digital evidence |
| IP address | unique address to identify computer connection |
| Biometrics | use of fingerprints or retinal scan for identification |
| Rootkit | hacker tools to access a computer |
| Server | provides high-speed access to specific data |
| White hat | security experts |
| Black hat | break into a computer and steals data |
| Gray hat | break into a computer but don't damage data |