gaining unauthorised access to a network system
hacking
storing a copy of files on a storage device to keep them safe
backup
a type of machine used by banks for enabling customers to withdraw money from their bank accounts
ATM, cash machine
an expert lacking in social skills
geek
a program that checks files for virus coding instructions inside another program and can be used for removing any virus coding instructions detected
anti-virus program
distributing programs that can reproduce themselves and are written with the purpose of causing damage or causing a computer to behave in an unusual way
spreading viruses
a secret code used to control access to a network system
password
a tiny, portable device that plugs into the USB port on your computer host, which can save information on a small flash memory chip. People commonly use it for data storage, backup, and transferring information between various devices, like cameras to computers, and vice versa.
USB stick
send to a different email address than the one it was originally sent to
reroute e-mail
electronic currency that is used for making electronic purchases over the Internet
digital cash
a technique that involves adding concealed instructions to a computer program so that it will still work but will also perform prohibited duties. In other words, it appears to do something useful but actually does something destructive in the background.
Trojan horse
protecting data by putting it in a form only authorised users can understand
encrypting
when a person gains entry to a computer network, system, application software, data, or other resources without permission. Also when legitimate users access a resource that they do not have permission to use
unauthorised access
redirecting the Web address (URL) to point to another website
Hijacking websites
combination of all the data on all the computer networks throughout the world, accessed using the Internet
cyberspace
a program that can reproduce itself and is written with the purpose of causing damage or causing a computer to behave in an unusual way. It infects other programs i.e. it attaches itself to other programs, known as host programs, and therefore reproduces itself
a computer virus
a combination of hardware and software used to control the data going into and out of a network
firewall
security devices that measure some aspect of a living being e.g. a fingerprint reader or an eye scanner
biometric security devices
changing the text and graphics on the webpages, sometimes leaving very rude messages on the system
defacing websites
software that is free to try out but must be paid for if it is used after the trial period
shareware
manipulating programs or data so that small amounts of money are deducted from a large number of transactions or accounts and accumulated elsewhere. The victims are often unaware of the crime because the amount taken from any individual is so small
A person who uses their skills to make cyberspace safer
white hat hacker
electronic devices that protect equipment from damage due to a sudden surge in a power supply
surge protectors
a slang term for an eccentric, socially inept person with little or no fashion sense and having an obsessive interest in a hobby or subject
anorak
a system that automatically disconnects a telephone line after receiving a call and then dials the telephone number of the system that made the call, to reconnect the line. It is used in remote access systems to make sure that connections can only be made from permitted telephone numbers
callback system