Software that automatically displays or downloads advertising material such as banners or pop-ups when a user is online.
Contains
B
Habit of snubbing someone in favour of a mobile phone
Starts with
C
Individual who breaks into a computer or a network system for malicious activities or own profit.
Starts with
D
Process of decoding ciphered text to plain text, so it is readable by the user
Starts with
E
Method by which plaintext or any other type of data is converted from a readable form to an encoded version that can only be decoded by another entity if they have access to a decryption key
Starts with
F
Hardware or Software to protect a computer against intruders
Starts with
G
Action by a paedophile of preparing a child for a meeting, especially via an Internet chat room, with the intention of committing a sexual offence.
Starts with
H
Skilled computer expert that uses their technical knowledge to overcome a problem
Contains
I
Broad term that refers to a variety of factors, techniques and technologies used to protect sensitive and private data, communications, and preferences
Contains
J
Malicious computer program which misleads users of its true intent
Contains
K
Text files that help a website keep track of your visits and activity
Starts with
L
Feature in communication software such as social networking where the user can express that they enjoy or support certain content
Starts with
M
Malicious software; any program or file that is harmful to a computer user
Starts with
N
Good manners in online communication such as e-mail, forums, blogs, and social networking sites
Contains
O
Server that acts as an intermediary between users and others servers, validating user requests.
Starts with
P
Fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
Starts with
R
Set of software tools that enable an unauthorized user to gain control of a computer system without being detected.
Starts with
S
Sending, receiving, or forwarding sexually explicit messages, photographs, or images, primarily between mobile phones, of oneself to others
Contains
T
Protocol over which data is sent between your browser and any website in a secure way (encrypted)
Contains
U
Software vulnerability that can be exploited to gain unauthorized access or privileges on a computer system.
Starts with
V
Piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
Starts with
W
Malware computer program that replicates itself in order to spread to other computers
Contains
X
Message warning the recipients of a non-existent computer virus threat.
Contains
Y
Malicious program for recording computer user keystrokes to steal passwords and other sensitive information.
Starts with
Z
Computer that's been infected by a computer virus or compromised by a hacker.