A program that is designed to harm a computer by deleting data, ruining files, and can spread secretly from one file to another
Virus
e-mail that is not wanted
SPAM
Measures taken to protect a computer or computer system against unauthorized access or attack
Cyber Security
Computer software that is provided, usually for free, that contains advertisements
Adware
A small self-contained and self-replicating computer program that invades computers on a network
Worm
A scam in which official-looking emails are sent to individuals in an attempt to get them to divulge private information
Phishing
Method in which a computer user is granted access only after successfully presenting two or more pieces of evidence
Multi-Factor Authentication
Software Designed to infiltrate or damage a computer system
Malware
A type of malicious software that is often disguised as legitimate software
Trojan
The act of obtaining of attempting to obtain otherwise secure data by conning and individual into revealing secure information
Social Engineering
A copy of data and/or applications stored for the event that data is lost
Backup
Computer software that secretly records information about the way you use your computer
Spyware
A computer that is controlled by a hacker who uses it to launch attacks on other computer systems
Zombie
When a hacker impersonates another device or user on a network
Spoofing
An integrated software designed to prevent unauthorized electronic access to a networked computer
Firewall
Software that threatens to publish the victims's data or perpetually block access to it unless a ransom is paid
Ransomware