Home » Finance

Online Banking and E-Commerce: Terms and Definitions

Jul 10, 2008
Access to information and entertainment, credit and financial services, and products from every corner of the world is greater than earlier generations could ever have imagined. Thanks to the Internet, consumers may order products, download games and music, or conduct online banking 24 hours a day.

However, the flip side is that the Internet also affords online scammers, hackers, and identity thieves access to personal computers, information, finances, and much more. According to the Federal Trade Commission, there are millions of victims of identity theft a year. It's often difficult to know how thieves obtain a victim's personal information, but instances of ID theft often start when online data is stolen.

The following is a glossary of terms, provided by the Federal Trade Commission, aimed at educating consumers on various software and computer scams used to steal and protect individuals from ID theft:

Anti-Virus Softare

Protects personal computers from viruses that can destroy data, slow a computer's performance, cause a crash, or even allow spammers to send email through a private account.


Shorthand for "business opportunity;" some schemes involve extravagant and unfounded earnings - claims and are actually fraudulent business ventures.

Browser Highjacker

A common spyware program that changes a web browser's home page automatically, even if the owner changes it back.


A law that prohibits senders of unsolicited commercial email from using false or misleading header information or deceptive subject lines, and requires they identify each email as an advertisement, among other provisions.


To copy files from one computer to another; to view a website or other web material with a browser.

Drive-by Download

Software that installs on a computer without the owner's knowledge when he or she visits certain websites. To avoid drive-by downloads, make sure to update operating system and Web browser regularly.


The scrambling of data into a secret code that can be read only by software set to decode the information.

End User Licensing Agreement (EULA)

A provider's legal terms. An "end user" may be required to "click" to accept before downloading software.


When sensitive data is released to someone without authorization.


Software that screens information on the Internet, classifies its content, and allows the user to block certain kinds of content.


Hardware or software that helps keep hackers from using a personal computer to send out personal information without permission.


Someone who uses the Internet to access computers without permission.

Hidden Dialers

Programs that a user may unknowingly download that can use a computer to silently dial expensive phone calls which later show up on a phone bill.

IP Address

A computer's "address," which consists of a series of numbers separated by periods.

Keystroke Logger

A device or program that records each keystroke typed on a particular computer.


Criminals sometimes use malware, programs like viruses and spyware, to get into a personal computer. Once there, the criminal can steal information, send spam, and commit fraud

Online Profiling

Compiling information about consumers' preferences and interests by tracking their online movements and actions in order to create targeted ads.

Personal Information

Information that can identify someone, such as bank and credit card numbers; income; Social Security Number; or name, address and phone numbers


A scam that involves Internet fraudsters who send span or pop-up messages to lure personal information from unsuspecting victims.

Spam Zombies

Home computers that have been taken over by spammers who then use them to send spam in a way that hides the true origin.


Unsolicited commercial email, often sent in bulk qualities.


Software program that may be installed on a personal computer without the owner's consent to monitor his or her use, send pop-up ads, redirect the computer to certain websites, or record keystrokes, which could lead to identity theft.


Programs that, when installed on a computer, can enable unauthorized people to access it and sometimes send spam from it.


A program that can sneak onto a computer - often through an email attachment - and then make copies of itself, quickly using up all available memory.

Wi-Fi Protected Access (WPA)

A security protocol developed to fix flaws in WEP. Encrypts data sent to and from wireless devices within a network.


A program that reproduces itself over a network and can use up a computer's resources and possibly shut the system down.

With awareness as a safety net, computer users conducting online banking or other activities that require the use of personal information can minimize the chances of identity theft. Vigilance is required when it comes to protecting personal information, a computer, and even yourself.
About the Author
AmericanMomentumBank.com provides a wide array of personal banking and business banking options and banking solutions tailored to your individual needs. For more information, please visit AmericanMomentumBank.com.
Please Rate:
(Average: Not rated)
Views: 187
Print Email Share
Article Categories
    • Artists
    • Gambling
    • Humanities
    • Humor
    • Movies
    • Music
    • Photography
    • Tattoos
    • Television
    • Classic Cars
    • Motorcycles
    • Recreational Vehicles
    • SUVs
    • Trucks
    • Vans
    • Branding
    • Business Opportunities
    • Careers and Jobs
    • Corporate
    • Customer Service
    • Direct Mail
    • Entrepreneurship
    • Ethics
    • Financing
    • Franchising
    • Home-Based Business
    • Human Resources
    • Import and Export
    • Leadership
    • Management
    • Market Research
    • Marketing and Advertising
    • Negotiation
    • Network Marketing
    • Networking
    • Organizational
    • Presentation
    • Project Management
    • Public Relations
    • Small Business
    • Strategic Planning
    • Team Building
    • Telemarketing
    • Training
    • Data Recovery
    • Databases
    • Games
    • Hardware
    • Networks
    • Operating Systems
    • Programming
    • Security
    • Software
    • Spyware and Viruses
    • Ask an Expert
    • College and University
    • Home Schooling
    • K-12
    • Languages
    • Online Education
    • Psychology
    • Coffee
    • Cooking
    • Gourmet
    • Recipes
    • Wine and Spirits
    • Acne
    • Aerobics
    • Alternative Medicine
    • Beauty
    • Cancer
    • Cosmetics
    • Depression
    • Diabetes
    • Diseases and Conditions
    • Fitness Equipment
    • Fitness
    • Hair Loss
    • Heart Disease
    • Medicine
    • Men's Health
    • Muscle Building
    • Nutrition
    • Skin Care
    • Supplements and Vitamins
    • Weight Loss
    • Women's Health
    • Yoga
    • Arts and Crafts
    • Babies
    • Collecting
    • Elderly Care
    • Genealogy
    • Hobbies
    • Parenting
    • Pets
    • Pregnancy
    • Woodworking
    • Feng Shui
    • Gardening
    • Home Appliances
    • Home Security
    • Interior Design
    • Landscaping
    • Affiliate Programs
    • Article Marketing
    • Auctions
    • Audio
    • Banner Advertising
    • Blogging
    • Broadband
    • Domain Names
    • E-Books
    • E-Commerce
    • Email Marketing
    • Ezines and Newsletters
    • Forums
    • Internet Marketing
    • Link Popularity
    • Pay-Per-Click
    • Podcasting
    • RSS
    • Search Engine Marketing
    • Search Engine Optimization
    • Security
    • Social Media
    • Spam
    • Video
    • Viral Marketing
    • Web Design
    • Web Development
    • Web Hosting
    • Copyright
    • Cyber Law
    • Intellectual Property
    • National, State, Local
    • Patents
    • Regulatory Compliance
    • Trademarks
    • Buying
    • Selling
    • Baseball
    • Basketball
    • Boating
    • Cycling
    • Extreme Sports
    • Fishing
    • Football
    • Golf
    • Hockey
    • Hunting
    • Martial Arts
    • Running
    • Scuba Diving
    • Soccer
    • Swimming
    • Tennis
    • Dating
    • Divorce
    • Marriage
    • Weddings
    • Astrology
    • Buddhism
    • Christianity
    • Faith
    • Hinduism
    • Islam
    • Judaism
    • Meditation
    • Metaphysical
    • New Age
    • Cable and Satellite TV
    • Cell Phones
    • Communication
    • Gadgets and Gizmos
    • GPS
    • Satellite Radio
    • Video Conferencing
    • VoIP
    • Addictions
    • Coaching
    • Goal Setting
    • Motivational
    • Stress Management
    • Time Management
    • Clothing
    • Electronics
    • Fashion
    • Gifts
    • Jewelry
    • Causes and Organizations
    • Environment
    • History
    • Holidays
    • Men's Issues
    • Nature
    • Philosophy
    • Politics
    • Women's Issues
    • World Affairs
    • Air Travel
    • Camping
    • Cruises
    • Destinations
    • Outdoors
    • Article Writing
    • Book Reviews
    • Copywriting
    • Fiction
    • Non-Fiction
    • Poetry
    • Quotes
    • Screenplay
    • Tools and Resources