• Antivirus
        Software designed to detect and destroy computer viruses.
      • Encryption
        The conversion of electronic data into another form called ciphertext, which cannot be easily understood by anyone except authorized parties.
      • Firewall
        Software or hardware that, after checking information coming into a computer from the Internet or an external network, either blocks the transmission or allows it to pass through, depending on the pre-set firewall settings, preventing access by hackers and malicious software.
      • Confidential Information
        Data that should be kept private including documents, images, and/or audio materials.
      • Virus
        A computer program that can replicate itself and spread from one computer to another.
      • Malware
        Malicious computer software that interferes with normal computer functions or sends personal data about the user to unauthorized parties over the Internet.
      • Spyware
        Software that secretly gathers information about a person or organization.
      • Trojan Horse
        A program in which malicious or harmful code is contained inside apparently harmless programs.
      • Phishing
        is the attempt to gain a person or companies sensitive information (username(s), passwords, credit card information, etc.), mainly for malicious and possibly monetary reasons by masquerading as a trusted entity via e-mail.
      • Identity Theft
        The fraudulent acquisition and use of a person’s personally identifying information (DOB, DL#, SSN, Passport, etc.) use typically for financial gain.
      • Social Engineering
        A con artist who can talk individuals into reveling personal information (passwords, DOB, home address, phone #, etc.) that can be used to compromise the organization or their personal information.
      • Dumpster Diving
        The practice of going through the trash to obtain valuable personal information such as SSN, DOB, credit card statements, bank statements, or other items that can be of value to them.

    Websites with more details and examples of phishing: