Software that replicates itself by inserting a copy of itself into another piece of software, which may cause the computer to crash and can lead to deletion or corruption of data
Process of determining whether someone is who they claim to be, to prevent unauthorized access through log-on using digital signatures, passwords and biometric scans