| A | B |
| Hacker | A programmer who breaks into someone else's computer system or data without permission |
| Cyber-Terrorist | A hacker or malware writer who uses a virus, worm, or coordinated computer attack to commit an act of terrorism against a political adversary |
| Ethical Hacking | Using security tools to find security holes and to test and improve security |
| Computer Forensics | The process of collecting digital evidence needed to identify and convict computer criminals |
| IP Address | A unique address that identifies where a computer is connected to the Internet. Internet Protocol |
| Good Passwords | These are non-words created by combining things you can remember, such as your pet's name, your street address, and a symbol |
| Biometrics | The use of biological data, like fingerprints or retinal scans, for identification |
| Rootkit | A collection of tools that allows a hacker to gain full access to a vulnerable computer and hide his or her tracks |
| Server | A computer that "serves" other systems by providing high-speed access to specific types of data, like personal files or email accounts |