| A | B |
| Cyper-stalking/bullying | Cybercrime involves harassment |
| Phishing | emails trick users to giving passwords/info |
| Computer Fraud | using computer to cheat people out of money |
| Pharming | redirects you to a phony website to get personal info |
| clickjacking | malware that post unwanted links on social media pages |
| white hats | Hackers hired to look for holes in co. software |
| grey hats | hackers who enjoy cracking software but do no harm |
| black hats | hackers who hack to be malicious |
| Hacktivism | Hacking to make a political statement |
| Cyberterorism | Hacks government networks for political reasons |
| Denial-of-Service attack | Cripples a network by overloading it with requests |
| Botnet | Network of computer zombies |
| Administrator | a user account that allows changes to system |
| Save passwords | 8 char/special char/upper/lower case etc. |
| Virus Program | A program that uses host files to infect |
| Router | Device that networks like a firewall |
| AUP | Acceptable User Policy |
| https | the site is safe for money transactions |
| User levels on an account | Standard/Admin/Guest |
| Antivirus | software that protects your computer |
| Downside of security suite | Decreases system performance |
| Encryption | Converts plain text into cipher text |
| SSID | another name for wireless not WiFi |
| Worms | infects computers and self replicates |
| SPAM | unsolicited mass emails that can carry viruses |
| Cookies | text files that collect info unknown to you |
| SPIM | unwanted text messages |
| Virus Programs | host files are used to infect and delete files |
| Keyloggers | Software that records key strokes |
| FBI/ATF/US Postal | government group that investigates cybercrimes |
| iC3 | groups created to make it east to report crimes |
| Computer Fraud/Abuse Act | law that makes it a crime to access classified info |
| Rootkit | programs that hyjack your system undetected |