Term
|
Definition
| Any illegal act involving a computer. |
|
|
Term
|
Definition
| Gaining access to a computer, network, file, or other resource without permission. |
|
|
Term
|
Definition
| Using a computer resource for unapproved activities. |
|
|
Term
|
Definition
| Using a computer to break into another computer system. |
|
|
Term
|
Definition
| Driving around an area with a Wi-Fi-enabled computer or mobile device to find a Wi-Fi network to access and use without authorization. |
|
|
Term
|
Definition
| Accessing an unsecured Wi-Fi network from your current location without authorization. |
|
|
Term
| Possessed knowledge access system |
|
Definition
| An access control system that uses information only the individual should know to identify that individual. |
|
|
Term
|
Definition
| A secret combination of characters used to gain access to a computer, computer network, or other resource. |
|
|
Term
| Two-factor authentication |
|
Definition
| Using two different methods to authenticate a user. |
|
|
Term
| Possessed object access system |
|
Definition
| An access control system that uses a physical object an individual has in his or her possession to identify that individual. |
|
|
Term
|
Definition
| An access control system that uses one unique physical characteristic of an individual (such as a fingerprint, face, or voice) to authenticate that individual. |
|
|
Term
|
Definition
| A collection of hardware and/or software intended to protect a computer or computer network from unauthorized access. |
|
|
Term
|
Definition
| A method of scrambling the contents of an e-mail message or a file to make it unreadable if an unauthorized user intercepts it. |
|
|
Term
|
Definition
| A Web page that uses encryption to protect information transmitted via that Web page. |
|
|
Term
|
Definition
| A type of encryption that uses a single key to encrypt and decrypt the file or message. |
|
|
Term
|
Definition
| A type of encryption that uses key pairs to encrypt and decrypt the file or message. |
|
|
Term
| Virtual private network (VPN) |
|
Definition
| A private, secure path over the Internet that provides authorized users a secure means of accessing a private network via the Internet. |
|
|
Term
|
Definition
| An act of malicious destruction to a computer or computer resource. |
|
|
Term
|
Definition
| A computer that is controlled by a hacker or other computer criminal. |
|
|
Term
|
Definition
| A group of bots that are controlled by one individual. |
|
|
Term
|
Definition
| Any type of malicious software. |
|
|
Term
|
Definition
| A software program installed without the user’s knowledge and designed to alter the way a computer operates or to cause harm to the computer system. |
|
|
Term
|
Definition
| A malicious program designed to spread rapidly to a large number of computers by sending copies of itself to other computers. |
|
|
Term
|
Definition
| A malicious program that pretends as something else. |
|
|
Term
| Denial of service (DoS) attack |
|
Definition
| An act of sabotage that attempts to flood a network server or a Web server with so much activity that it is unable to function. |
|
|
Term
|
Definition
| Software, typically a suite of programs, used to protect your computer against a variety of threats. |
|
|
Term
|
Definition
| Software used to detect and eliminate computer viruses and other types of malware. |
|
|
Term
|
Definition
| A fraud or scam carried out through the Internet. |
|
|
Term
|
Definition
| Using someone else’s identity to purchase goods or services, obtain new credit cards or bank loans, or otherwise illegally masquerade as that individual. |
|
|
Term
|
Definition
| The use of spoofed e-mail messages to gain credit card numbers and other personal data to be used for fraudulent purposes. |
|
|
Term
|
Definition
| A personalized phishing scheme targeted at an individual. |
|
|
Term
|
Definition
| The use of spoofed domain names to obtain personal information to be used in fraudulent activities. |
|
|
Term
|
Definition
| When an item purchased through an online auction is never delivered after payment, or the item is not as specified by the seller. |
|
|
Term
|
Definition
| A group of electronic data that can be used to verify the identity of a person or organization; includes a key pair that can be used for encryption and digital signatures. |
|
|
Term
|
Definition
| A unique digital code that can be attached to a file or an e-mail message to verify the identity of the sender and guarantee the file or message has not been changed since it was signed. |
|
|
Term
|
Definition
| Children or teenagers bullying other children or teenagers via the Internet. |
|
|
Term
|
Definition
| Repeated threats or harassing behavior between adults carried out via e-mail or another Internet communications method. |
|
|