A | B |
Encryption | Technology that scrambles information so that only the sender and receiver can read it. |
Sniffers | Programs that lurk in cyberspace and intercept messages containing specific text. |
Worm | Programs designed to enter a computer network, spread and reproduce. |
Trojan horse | Programs disguised to perform a useful function but instead can cause damage and infiltrate a network. |
Michaelangelo | Activated on a specific date, March 6, 1994, and was spread through infected floppy disks. |
Virus | Software that is created to intentionally destroy data. |
Bomb | Type of virus that activates on a particular date. |
Melissa | Specific virus spread through e-mail attachments and was harmful in that it flooded the Internet stopping the flow of activiity. |
Backup | A separate copy of your work. |
Macro virus | Virus spread among different operating systems transmitted in a Microsoft Word document. |