A virus or physical device that logs information sent to a visual display to capture private or personal information.
Something that modifies or reduces one or more security risks.
Any observable security-related occurrence in a network or system, not yet determined to have negative ramifications.
A violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security practices.
Information that is protected against unwarranted disclosure. Access to sensitive data should be safeguarded. Protection of sensitive data may be required for legal or ethical reasons, for issues pertaining to personal privacy, or for proprietary considerations.
A computer or computer program which manages access to a centralized resource or service in a network.
A mobile phone built on a mobile computing platform that offers more advanced computing ability and connectivity than a standard mobile phone.
A fraudulent or malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver.
Malware that passes information about a computer user’s activities to an external party.