Like this study set? Create a free account to save it.

Sign up for an account

Already have a Quizlet account? .

Create an account

computer fraud

Conduct that uses a computer in order to obtain money, property, or value dishonestly, or to cause loss.


Person who invades someone else's computer for personal gain or just for personal satisfaction.


Scrambling a message so that no one else can read it.


Verifying your identity through a username and password or biometrics.

time bomb

A virus that does not cause its damage until a certain date or until the system has been booted a certain number of times.

trojan horse

A virus that does something different from what it is expected to do.


A program that has been written, usually by a hacker, to cause the corruption of data on a computer.


Unsolicited email


Act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft


Any software that secretly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes


A virus that makes copies of itself.


Short for malicious software


A system designed to prevent unauthorized access to or from a computer or a private network

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions and try again


Reload the page to try again!


Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

Voice Recording