Software designed to detect and destroy computer viruses.
The conversion of electronic data into another form called ciphertext, which cannot be easily understood by anyone except authorized parties.
Software or hardware that, after checking information coming into a computer from the Internet or an external network, either blocks the transmission or allows it to pass through, depending on the pre-set firewall settings, preventing access by hackers and malicious software.
- ial Information
Data that should be kept private including documents, images, and/or audio materials.
A computer program that can replicate itself and spread from one computer to another.
Malicious computer software that interferes with normal computer functions or sends personal data about the user to unauthorized parties over the Internet.
Software that secretly gathers information about a person or organization.
A program in which malicious or harmful code is contained inside apparently harmless programs.
is the attempt to gain a person or companies sensitive information (username(s), passwords, credit card information, etc.), mainly for malicious and possibly monetary reasons by masquerading as a trusted entity via e-mail.
The fraudulent acquisition and use of a person’s personally identifying information (DOB, DL#, SSN, Passport, etc.) use typically for financial gain.
A con artist who can talk individuals into reveling personal information (passwords, DOB, home address, phone #, etc.) that can be used to compromise the organization or their personal information.
The practice of going through the trash to obtain valuable personal information such as SSN, DOB, credit card statements, bank statements, or other items that can be of value to them.
Websites with more details and examples of phishing: