1.3 Defining terms

In addition to the types of malware described in the previous sections, ‘Adware’, that forces users to view advertising, and ‘Spyware’, malware that attempts to access personal information and user passwords, are other examples you may have heard about.
From the Sophos Threatsaurus PDF downloaded in Week 1 (https://ugc.futurelearn.com/uploads/files/3f/d3/3fd36a66-d941-4595-b587-1a7b41998ae9/Week_3_Sophos_Threatsaurus_AZ.pdf) , look for a term that you have not come across before.
Try to think of a way to define the term in your own words.
You could also look at examples or information from the sources recommended in Week 1, Section 2.2, How to keep up to date.
OpenLearn - Introduction to cyber security
Except for third party materials and otherwise, this content is made available under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 Licence, full copyright detail can be found in the acknowledgements section. Please see full copyright statement for details.
