Anti-virus Software
software developed to detect and remove viruses
Encryption
transforming data into an unreadable form for security
firewall
hardware that creates a boundary between your computer and internet
spam
unsolicited email or junk mail
port scan
identifying access points into a computer system
hacker
individual who gains unauthorized access to data
virus
harmful or damaging program
time bomb
program that waits for a specific time before causing damage
trojan horse
innocent looking program
worm
self replicating program that sends copies to other computers
internet fraud
illegal use of the internet
data theft
stealing data
sabotage
deliberate damage to operations or equipment
spoofing
using incorrect identification
wiretapping
eavesdropping or intercepting transmissions
zombie
program inserted into a vulnerable system to await further instructions