Key Terms: Acceptable use policy, Adware, Authentication and Authorization, Biometrics, Clickstream, Content filtering, Cookie, Copyright, Counterfeit software, Denial of Service Attack, Encryption, Fair use doctrine, Firewall, Hacker, Identity theft, Information privacy policy, Intellectual property, Intrusion detection software, Key logger software, Packet tampering, Phishing, Public key encryption, Smart card, SSL Encryption, Sniffer, Social engineering, Spam, Spoofing, Spyware, Token, Trojan-horse virus, Virus, Web log, Worm. |
|