| A | B |
| Computer Security | measures you can take to protect yourself from threats and damages |
| Computer privacy | keeps personal files and data secure from unauthorized viewing |
| Hacker | someone who seeks to compromise someone elses computer |
| virus | malicious program that inserts self onto the computer and invades |
| Worm | no program is needed, it spreads to other computers |
| Trojan Horse | appears to be harmless but has hidden code that can send info to the developer |
| Spyware | collects habits and data of user |
| Intellectual Property | creation of a work from the mind. Example: song, poem, video |
| Slander | false verbal statements |
| Libel | a written defamation |
| defamtion of character | harming someone's reputation by making false statements |
| Logo | a graphic representation of a business |
| Online Predator | users who seek to expoloit vunderable persons on the Internet |