Term
|
Definition
Any illegal act involving a computer. |
|
|
Term
|
Definition
Gaining access to a computer, network, file, or other resource without permission. |
|
|
Term
|
Definition
Using a computer resource for unapproved activities. |
|
|
Term
|
Definition
Using a computer to break into another computer system. |
|
|
Term
|
Definition
Driving around an area with a Wi-Fi-enabled computer or mobile device to find a Wi-Fi network to access and use without authorization. |
|
|
Term
|
Definition
Accessing an unsecured Wi-Fi network from your current location without authorization. |
|
|
Term
Possessed knowledge access system |
|
Definition
An access control system that uses information only the individual should know to identify that individual. |
|
|
Term
|
Definition
A secret combination of characters used to gain access to a computer, computer network, or other resource. |
|
|
Term
Two-factor authentication |
|
Definition
Using two different methods to authenticate a user. |
|
|
Term
Possessed object access system |
|
Definition
An access control system that uses a physical object an individual has in his or her possession to identify that individual. |
|
|
Term
|
Definition
An access control system that uses one unique physical characteristic of an individual (such as a fingerprint, face, or voice) to authenticate that individual. |
|
|
Term
|
Definition
A collection of hardware and/or software intended to protect a computer or computer network from unauthorized access. |
|
|
Term
|
Definition
A method of scrambling the contents of an e-mail message or a file to make it unreadable if an unauthorized user intercepts it. |
|
|
Term
|
Definition
A Web page that uses encryption to protect information transmitted via that Web page. |
|
|
Term
|
Definition
A type of encryption that uses a single key to encrypt and decrypt the file or message. |
|
|
Term
|
Definition
A type of encryption that uses key pairs to encrypt and decrypt the file or message. |
|
|
Term
Virtual private network (VPN) |
|
Definition
A private, secure path over the Internet that provides authorized users a secure means of accessing a private network via the Internet. |
|
|
Term
|
Definition
An act of malicious destruction to a computer or computer resource. |
|
|
Term
|
Definition
A computer that is controlled by a hacker or other computer criminal. |
|
|
Term
|
Definition
A group of bots that are controlled by one individual. |
|
|
Term
|
Definition
Any type of malicious software. |
|
|
Term
|
Definition
A software program installed without the user’s knowledge and designed to alter the way a computer operates or to cause harm to the computer system. |
|
|
Term
|
Definition
A malicious program designed to spread rapidly to a large number of computers by sending copies of itself to other computers. |
|
|
Term
|
Definition
A malicious program that pretends as something else. |
|
|
Term
Denial of service (DoS) attack |
|
Definition
An act of sabotage that attempts to flood a network server or a Web server with so much activity that it is unable to function. |
|
|
Term
|
Definition
Software, typically a suite of programs, used to protect your computer against a variety of threats. |
|
|
Term
|
Definition
Software used to detect and eliminate computer viruses and other types of malware. |
|
|
Term
|
Definition
A fraud or scam carried out through the Internet. |
|
|
Term
|
Definition
Using someone else’s identity to purchase goods or services, obtain new credit cards or bank loans, or otherwise illegally masquerade as that individual. |
|
|
Term
|
Definition
The use of spoofed e-mail messages to gain credit card numbers and other personal data to be used for fraudulent purposes. |
|
|
Term
|
Definition
A personalized phishing scheme targeted at an individual. |
|
|
Term
|
Definition
The use of spoofed domain names to obtain personal information to be used in fraudulent activities. |
|
|
Term
|
Definition
When an item purchased through an online auction is never delivered after payment, or the item is not as specified by the seller. |
|
|
Term
|
Definition
A group of electronic data that can be used to verify the identity of a person or organization; includes a key pair that can be used for encryption and digital signatures. |
|
|
Term
|
Definition
A unique digital code that can be attached to a file or an e-mail message to verify the identity of the sender and guarantee the file or message has not been changed since it was signed. |
|
|
Term
|
Definition
Children or teenagers bullying other children or teenagers via the Internet. |
|
|
Term
|
Definition
Repeated threats or harassing behavior between adults carried out via e-mail or another Internet communications method. |
|
|