| A | B |
| Malware | a set of instructions that run on your computer and make your system do something that an attacker wants it to do. |
| Virus | A malicious piece of code that spreads itself from file to file |
| Worm | A malicious piece of code that spreads itself from computer to computer by exploiting vulnerabilities |
| Spyware | software that enables a user to obtain “undercover” or covert information about another person’s computer activities by transmitting data covertly from their hard drive |
| Trojan | A malicious piece of code with hidden side-effects that are not specified in the program documentation and are not intended by the user executing the program |
| Adware | A malicious piece of code that hides on your device and serves you advertisements. |
| Keylogger | A malicious piece of code that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information |
| Hacker | A person who uses a computer to gain unauthorized access to a computer system. |
| Ransomware | A form of malware that holds a computer hostage until one pays money to the attacker |