• Antivirus
    Software designed to detect and destroy computer viruses.
  • Encryption
    The conversion of electronic data into another form called ciphertext, which cannot be easily understood by anyone except authorized parties.
  • Firewall
    Software or hardware that, after checking information coming into a computer from the Internet or an external network, either blocks the transmission or allows it to pass through, depending on the pre-set firewall settings, preventing access by hackers and malicious software.
  • Confidential Information
    Data that should be kept private including documents, images, and/or audio materials.
  • Virus
    A computer program that can replicate itself and spread from one computer to another.
  • Malware
    Malicious computer software that interferes with normal computer functions or sends personal data about the user to unauthorized parties over the Internet.
  • Spyware
    Software that secretly gathers information about a person or organization.
  • Trojan Horse
    A program in which malicious or harmful code is contained inside apparently harmless programs.
  • Phishing
    is the attempt to gain a person or companies sensitive information (username(s), passwords, credit card information, etc.), mainly for malicious and possibly monetary reasons by masquerading as a trusted entity via e-mail.
  • Theft
    The fraudulent acquisition and use of a person’s personally identifying information (DOB, DL#, SSN, Passport, etc.) use typically for financial gain.
  • Social Engineering
    A con artist who can talk individuals into reveling personal information (passwords, DOB, home address, phone #, etc.) that can be used to compromise the organization or their personal information.
  • Diving
    The practice of going through the trash to obtain valuable personal information such as SSN, DOB, credit card statements, bank statements, or other items that can be of value to them.

Websites with more details and examples of phishing: