| A | B |
| Copyrighted | Software can be copied for backup purposes only. |
| Public Domain | Software can be feely copied and is distributed free to everyone. |
| Freeware/Shareware | Software distributed on a trial basis and you are expected to pay a small fee in order to keep it. |
| Web Copyright Law of 1997 | Protects material published on the Internet and copyrighted if the value of the work is greater than $1000. |
| Copmputer Fraud and Abuse Act of 1986 (CFAA) | Stealing passwords or hacking into a network in order to steal information, commit fraud or inflict intentional damang is illegal. |
| Safety and Freedom through Encryption Act | Allows US citizens to protect their own material using encryption techniques but makes it a Federal crime to use this technology to conceal a crime. |
| Sniffers | Programs that lurk in cyberspace and intercept messages containing specific text. |
| Worm | Programs designed to enter a computer network, spread and reproduce. |
| Trojan horse | Programs disguised to perform a useful function but instead can cause damage and infiltrate a network. |
| Michaelangelo | Activated on a specific date, March 6, 1994, and was spread through infected floppy disks. |
| Virus | Software that is created to intentionally destroy data. |
| Encryption | Technology that scrambles information so that only the sender and receiver can read it. |
| Bomb | Type of virus that activates on a particular date. |
| Melissa | Specific virus spread through e-mail attachments and was harmful in that it flooded the Internet stopping the flow of activiity. |
| Internet | Electronic highway connecting millions of computer and individauls worldwide. |
| Passwords | Personal security codes which allow you to access online accounts. |
| SYSOP | Acronym for systems operator. |
| Privacy Rights | Vary tremendously depending on the identiy of the intruder. |
| Backup | A separate copy of your work. |
| Macro virus | Virus spread among different operating systems transmitted in a Microsoft Word document. |