| A | B |
| Adware | While browsing the Internet, you notice that the browser display pop-ups that are targeted towards recent keyboard searches you have performed. |
| Backdoor | Mechanism for gaining access to a computer that bypasses or subverts the normal method of authorization |
| Botnet | Organized group of compromised computers |
| Browser Hijacker | The Browser Hijacker Virus is usually contracted by voluntarily downloading something, and this virus will re-direct you to a different website to usually increase the websites revenue from their advertisements. |
| Computer worm | Self-replicating program designed to carry out some unauthorized activity on a victim's computer. Worms can spread themselves from one computer to another without any assistance from victims. |
| Denial of service (dos) | An attack that attempts to consume network resources so that the network or its devices cannot respond to legitimate requests. |
| Encryption | For security, data is translated into a secret code according to a set of rules in a special 'key'. To convert the data back into plain text, the receiver must also have the key |
| Hacker | A person who secretly gains access to computers and files without permission. |
| Hoax | an act intended to trick or deceive, a fraud; to trick, deceive |
| Keystoke Logger | Recoding the keys struck on a keyboard |
| Malware | software designed to infiltrate or damage a computer system without the user's informed consent |
| Mouse Trapping | Keeping visitors from leaving a website by locking them into a window, opening multiple windows on the desktop or re-launching their website in a window that can't be closed is |
| Pharming | Reroutes requests for legitimate websites to false websites |
| Phishing | An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information |
| Pop-up | an advertisement that opens in a new window when a web page is being viewed |
| Pretexting | Invented scenerio. |
| Scareware | It is a malware tactic that manipulates users into believing they need to download or buy malicious, sometimes useless, software. |
| Smishing | A type of phishing which uses SMS messages as opposed to emails to target individuals. |
| Social Engineering | A method of deceiving users into divulging private information, social engineering takes advantage of our natural tendency to trust one another rather than rely solely on technological means to steal information. Often associated with phishing, pharming, spam, and other Internet-based scams. |
| Spam | unwanted e-mail (usually of a commercial nature sent out in bulk) |
| Spear-Phishing | A more targeted attempt to steal sensitive information and typically focuses on a specific individual or organization. |
| Spyware | A computer program which is installed without permission, sometimes through a virus or sometimes as part of the installation of a program. It works by collecting information and sending it back to another source. The information collected could include the websites you have been visiting or what you have been downloading. This can be used for marketing purposes but also for fraud. |
| Tailgating | It involves someone following an employee into a restricted area. |
| Trojan Horse Virus | A type of malware program that substitutes itself as a legitimate program. |
| Virus | A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data |
| Vishing | It refers to phishing scams that take place over the phone. |
| Watering Hole | Watering hole is a computer attack strategy in which an attacker guesses or observes which websites an organization often uses and infects one or more of them with malware. |
| Whaling attack | It is an attempt to steal sensitive information and is often targeted at senior management or other high-profile targets such as politicians or celebrities. |
| Zombie | A compromised computer whose owner is unaware the computer is being controlled remotely by an outsider |