Term
|
Definition
any software created to cause damage, steal information, or use up resources on a computer or network |
|
|
Term
|
Definition
a small program written to alter the way a computer operates without the permission of the user |
|
|
Term
|
Definition
A program that replicates itself from system to system |
|
|
Term
|
Definition
Imposters/files that claim to be something desirable but are in fact malicious. |
|
|
Term
|
Definition
Programs that hide in your computer to steal information such as cc numbers, email address, and home address. |
|
|
Term
|
Definition
-A mass mailing of messages |
|
|
Term
|
Definition
attacks that use spoofed emails and fraudulent websites which imitate legitimate companies to entice people to share passwords or credit card numbers |
|
|
Term
|
Definition
an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system. |
|
|
Term
|
Definition
any online bully that scams, cheats, abuses or victimizes an online player |
|
|
Term
|
Definition
disabling a mouse so that a page or site cannot be clicked off or out of |
|
|