Security
Worms
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program.
Keylogger
A keylogger is a type of surveillance software (considered to be either software or spyware) that has the capability to record every keystroke you make to a log file, usually encrypted. A keylogger recorder can record instant messages, e-mail, and any information you type at any time using your keyboard.
Viruses
A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
Denial of service (DOS)
An interruption in an authorized user's access to a computer network, typically one caused with malicious intent.
Hacking
Hacking is any technical effort to manipulate the normal behavior of network connections and connected systems. A hacker is any person engaged in hacking.
Online Fraud
Online fraud comes in many forms. It ranges from viruses that attack computers with the goal of retrieving personal information, to email schemes that lure victims into wiring money to fraudulent sources, to "phishing" emails that purport to be from official entities (such as banks or the Internal Revenue Service) that solicit personal information from victims to be used to commit identity theft, to fraud on online auction sites (such as Ebay) where perpetrators sell fictional goods. The methods used by perpetrators of online fraud are constantly evolving.
Spyware
Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
Phishing
The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers, online.
Identity Theft
The fraudulent practice of using another person's name and personal information in order to obtain credit, loans, etc.
Trojans
Trojans are malicious programs that perform actions that have not been authorized by the user. These actions can include: Deleting data Blocking data Modifying data Copying data Disrupting the performance of computers or computer networks Unlike computer viruses and worms, Trojans are not able to self-replicate.