ainti-virus software
software developed to detect and remove viruses
encryption
transforming data into an unreadable form for security
firewall
software that created a boundary between your computer and internet
spam
unsolicited email/ junk mail, unwanted
port scam
identifies access points into a computer system
hacker
individual that gains unauthorized access into a computer system
virus
harmful or damaging program
time bomb
program that waits for a specific time before causing damage
trojan horse
an innocent looking program
worm
a program that replicates itself and sends copies to other computers
internet fraud
illegal use of the internet
data theft
stealing data
sabotage
deliberate damage to operations or equipment
spoofing
using incorrect identification
wiretapping
eaves dropping on data or voice transmission
zombie
a program inserted to await further instructions