| A | B |
| trojans | Programs that look useful, but actually cause damage to your computer. |
| spam | Any unsolicited e-mail, or junk mail. Most spam is either a money scam or sexual in nature. Internet service Providers, e-mail software, and other software can help block some, but not all, spam. |
| viruses | Self-replicating programs that damage hard drives and affect the normal operation of your computer |
| phishing | Fake e-mails that appear to come from a legitimate source looking to “verify” personal or financial information. |
| cyberbullying | Use of Internet technologies to tease, humiliate, and harass someone. Or, the use of technology to spread rumors and gossip, post pictures without consent, steal passwords to assume someone else's identity, threaten or harass with offensive language. |
| blog | an online journal or diary |
| grooming | trying to gain your trust by making promises, sending you gifts or offering you affection and attention. |
| cookie | A piece of information about your visit to a website that some websites record automatically on your computer. By using these, a website operator can determine a lot of information about you and your computer. |
| cybercrime | Any internet-related illegal activity. |
| cyberstalking | Methods individuals use to track, lure, or harass another person online. |
| electronic footprint | computers maintain a record of all website visits and e-mail messages, leaving a trail of the user’s activity in cyberspace. These data can still exist even after the browser history has been cleared and e-mail messages have been deleted. |
| file sharing | This software enables multiple users to access the same computer file simultaneously. File sharing sometimes is used illegally to download music or software. |
| flame | A hostile, strongly worded message that may contain obscene language. |
| identity theft | In this crime, someone obtains the vital information (e.g., credit card, social security number, bank account numbers) of another person, usually to steal money. E-mail scams, spyware, and viruses are among the most typical methods for stealing someone’s identity. |
| malware | stands for malicious software or code, which includes any harmful code—trojans, worms, spyware, adware, etc.—that is designed to damage the computer or collect information. |
| pharming | A scheme that sends you to fake websites where hackers secretly collect personal information and passwords. |
| netiquette | Rules or manners for interacting courteously with others online (such as not typing a message in all capital letters, which is equivalent to shouting). |
| spyware | Malicious code that secretly watches what you do on your computer and sends the information over the Internet. |