Conduct that uses a computer in order to obtain money, property, or value dishonestly, or to cause loss.
Person who invades someone else's computer for personal gain or just for personal satisfaction.
Scrambling a message so that no one else can read it.
Verifying your identity through a username and password or biometrics.
A virus that does not cause its damage until a certain date or until the system has been booted a certain number of times.
A virus that does something different from what it is expected to do.
A program that has been written, usually by a hacker, to cause the corruption of data on a computer.
Act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft
Any software that secretly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes
A virus that makes copies of itself.
Short for malicious software
A system designed to prevent unauthorized access to or from a computer or a private network