unsolicited commercial email sent from one source with identical message sent to multiple recipients usually carries virus; junk email
Spammer
person who creates electronic spam
Email Spoofing
used to deceive people by stealing identity from other/someone you know. it is also used to hide the origin of the spam
Phishing
trying to get confidential information such as passwords and usernames, and credit card details by making it appear as if comes from a trustworthy source.
Pharming
redirects internet users to fake websites to steal personal or financial information
Spyware
computer program that is installed secretly on a personal computer to collect information or even take control over the computer without the knowledge of the user.
Computer Worm
self-replicating malware that duplicates itself to spread to uninfected computers. may delete files, disrupt network function, or send junk mail from infected computer (e.g. i love you virus)
Trojan Horse
pretending to perform a good task, but secretly performs undesirable function with the intention of entering the computer without the user’s consent.
Hackers
person who is able to enter and control other people’s computer without authorization.
Windows Security
necessary to protect important work & personal information stored in the computer
Computer Administrator
kind of account that controls all the contents and users of the computer, installs programs, add, and deletes users.
Limited Account
kind of account that has limited control and only have access to his/her particular account.
Guest
accounts created for transient user and do not have access to the other computer accounts and their content.
Firewall
helps in protecting your computer from unauthorized entries, viruses, or worms from the internet or network
Automatic Updates
feature on Windows which when turned on will automatically download updates from Microsoft Windows Website.
Virus Protection
locate, find, and remove virus threats that are already in the computer
Ten Commandments for Computer Ethics
Thou shalt not use a computer to harm other people
Thou shalt not interfere w/ other people's computer work
Thou shalt not snoop around other people's files
Thou shalt not use computer to steal
Thou shalt not use computer to bear false witness
Thou shalt not use/copy software for which u have not paid
Thou shalt not use other people's computer resources w/o authorization
Thou shalt not appropriate other people's intellectual output
Thou shalt think about social consequences of the program you write
Thou shalt use computer in ways that show consideration & respect