| A | B |
| Netiquette | the rules or guidelines of behavior while on the Internet. |
| Ethics | Refers to the rules and standards governing the conduct of an individual in society |
| Hacker | someone who seeks information by breaking into computer systems and networks. While this is not legal, the intent is not to harm. |
| Cracking | this is someone who seeks to cause harm by breaking into secure networks or systems. |
| Software Piracy | Copying Software without paying for it or without getting permission from the owner. |
| Copyright | refers to laws that regulate the use of the work of a creator, such as an artist or author. This includes copying, distributing, altering and displaying creative, literary and other types of work |
| Identity Theft | a crime in which an imposter obtains key pieces of personal information, such as Social Security or driver's license numbers, in order to impersonate someone else. The information can be used to obtain credit, merchandise, and services in the name of the victim, or to provide the thief with false credentials |
| Fair Use | exceptions and limitations to copyright law that allow the public to use portions of copyrighted material |
| Plagiarism | stealing” someone else’s work and pretending it’s yours. Usually by copying it word for word in a document. |
| Encryption | software that transforms information into code that can only be read using a key or specialized software |
| Virus | a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer |
| Firewall | A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting outward communication. |
| Digital Citizen | is one who knows what is right and wrong, exhibits intelligent technology behavior, and makes good choices when using technology. |
| Computer Forensics | the practice of collecting, analyzing and reporting on digital data in a way that is legally admissible. It can be used in the detection and prevention of crime and in any dispute where evidence is stored digitally. |
| Internet Security | a branch of computer security specifically related to the Internet, often involving browser security but also network security on a more general level as it applies to other applications or operating systems |
| Spyware | programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties (can be used to monitor employee use of computers) |
| Adware | also known as advertising supported software is a software package that automatically plays or downloads advertisements to a computer after the software is installed on it or while the application is being used. |
| Malware | is software designed to damage a computer system without the owner’s knowledge or consent. |
| Phishing | an e-mail fraud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients. |