How can we help?

You can also find more resources in our Help Center.

Security

STUDY
PLAY
computer fraud
Conduct that uses a computer in order to obtain money, property, or value dishonestly, or to cause loss.
hacker
Person who invades someone else's computer for personal gain or just for personal satisfaction.
encrypting
Scrambling a message so that no one else can read it.
authentication
Verifying your identity through a username and password or biometrics.
time bomb
A virus that does not cause its damage until a certain date or until the system has been booted a certain number of times.
trojan horse
A virus that does something different from what it is expected to do.
virus
A program that has been written, usually by a hacker, to cause the corruption of data on a computer.
spam
Unsolicited email
phishing
Act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft
spyware
Any software that secretly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes
worm
A virus that makes copies of itself.
malware
Short for malicious software
firewall
A system designed to prevent unauthorized access to or from a computer or a private network