| A | B |
| Cyberspace | The online "world". A network of computers and communication systems, where organizations and individuals interact and exchange information. |
| Cybersecurity | The steps that organizations and individuals take to protect their hardware, software and information from online criminal activity. |
| Cookies | Small data files that a website can install on your computer's hard drive. These files collect and store information about you and your activities on the site. Hackers can use cookies to steal your personal information. |
| Encryption | A way to secure information by scrambling it into a code that can be read only by authorized individuals. |
| Flaming | Posting or sending offensive, verbally abusive messages on blogs, chat rooms, news groups or other online discussion forums. Deliberately trying to provoke someone online is generally a violation of the terms of service with your Internet service provider (ISP) |
| Malware | Created to damage or illegally access a computer or network. Cybercriminals may attach malware to legitimate websites, downloads or attachments. When you visit the website, download the program or open the attachment, the malware can secretly install viruses, spyware or worms. |
| Patch | Software you download to fix or update a computer program. |
| Phishing | Cybercriminals send you and unsolicited e-mail that pretends to come from a well-known company. The e-mail will have an official look and may include logos that appear to be legitimate. It may instruct you to "update" or "validate" your account information or face potential consequences or direct you to a fraudulent website with the "look and feel" like that of the targeted business. Legitimate businesses never request personal or confidential information via e-mail. |
| Router | A device that connects devices from two or more networks and finds the best path for sending information across those networks. |
| Smart Card | A plastic card embedded with a microchip that can store and process information. |
| Spamming | Unsolicited electronic communication considered junk e-mail. Commonly used for commercial advertising. |
| User Authentication | Validating someone's identity before they can access sensitive information, generally by requiring a username, personal identification number (PIN) and/or passwords. |
| Wireless Network | Computers and other devices that exchange information across radio waves, without cables. |
| Cyberterrorism | When foreign or domestic attackers use the Internet and the country's technological infrastructure to attack the nation's economy public works, communication systems and other vital interests. |
| Information Warfare | When cybercriminals or cyberterrorists use the Internet to collect, use and manage information in pursuit of a strategic or competitive advantage over an opponent. Information warfare may include the spreading of propaganda or disinformation to manipulate an enemy or the general public. |