is a computer program that was written to purposely damage computer systems.
The policy that a company or organization operating a web site uses for handling the personal information collected about visitors to the site.
Illegally copying copyrighted software, music, or movies
An online scam that uses e-mail to "fish" for users' private information by imitating legitimate companies.
An online scam that attacks the browser's address bar. Users type in what they think is a valid web-site address and are unknowingly redirected to an illegitimate site that steals their personal information.
e-mail from someone you don't know. It is usually trying to sell you something.
Mass mailings sent as Instant Messages to users. Often these can feature links to explicit **** sites.
Courtesy, honesty, and polite behavior practiced on the internet.
A commonly used technique by pornography sites where a user gets "locked" in a web site.
Software products that allow parents to monitor or track the web sites or e-mail messages that a child visits or reads.
A popular term for someone who accesses computer information either legally or illegally
Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated, unwanted messages
sending or posting harmful or cruel text or images using the internet or other digital communication devices.
A form of filtering that blocks only sites specified as harmful.
Computer programs that block access to web sites or other services available over the internet.
openly available to everyone and not subject to copyright protection
A legal device that provides the owner the right to control how a creative work is used.
is gaining access into any computer, network, storage medium, system, program, file, user area, or other private repository, without the express permission of the owner.
the study of human actions. It deals with issues such as defining "right and wrong" as well as the gray area in between.
concerned with the principles of right and wrong behavior and the goodness or badness of human character:
the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source
the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people.
is protective software designed to defend your computer against malicious software.
type of malware that is installed on computers and that collects information about users without their knowledge.
any software application in which advertising banners are displayed while the program is running.
short for malicious software, is software designed to infiltrate or damage a computer system without the owner's informed consent.