| A | B |
| Adware | software that automatically displays or download material that tries to sell yiou something |
| Antivirus | software designed to detect and destroy malware |
| Backdoor | access to a computer that bypasses security mechanisms |
| Cookies | small packet of data that is used to identify the user when returning to a website |
| Download | copy data from one computer system to another |
| Attachment | computer file sent along with an email message |
| Encryption | process of encoding a message so that it can only be read by the recipient |
| Firewall | designed to block unauthorized access to the protected device |
| Hackers | person who uses computer to gain unauthorized access to data |
| Cybercrime | illegal activity that uses a computer as its primary means of commission |
| Login | sequence of characters used to identify a user to allow access to computer system |
| Online storage | information that is saved to the Cloud |
| Netiquette | the correct way of communicating on the Internet |
| Phishing | usually an email falsely claiming to be a legitimate enterprise in an attempt to scam the user into surrendering private information |
| Password | used along with a sign-in that verify the identify of the user |
| Shareware | software that is free of charge for a limited time or with a limited capacity |
| Spam | unwanted email |
| Security patches | fixes to an operating system intended to repair or correct vulnerability to hacking or viruses |
| Spyware | software that enables the user to obtain covert information about another user's computer activities |
| Trojan Horse | a virus that is hidden inside a legitimate program |
| Virus | program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes |
| Worm | self-replicating program that works through a network |
| Zombie | a computer controlled by another person without the owner's knowledge or consent |