Skip to content
Skip to main content

About this free course

Share this free course

Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)
Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)

Start this free course now. Just create an account and sign in. Enrol and complete the course for a free statement of participation or digital badge if available.

1.3 Defining terms

This section is part of the amber and green pathways.

The image shows a person using a laptop which is sitting on top of a pile of books.
Figure 6

In addition to the types of malware described in the previous sections, ‘Adware’, that forces users to view advertising, and ‘Spyware’, malware that attempts to access personal information and user passwords, are other examples you may have heard about.

From the Sophos Threatsaurus PDF [Tip: hold Ctrl and click a link to open it in a new tab. (Hide tip)] , look for a term that you have not come across before.

Try to think of a way to define the term in your own words.

You could also look at examples or information from the sources recommended in Week 1, Section 2.2, How to keep up to date.

Please complete Quick poll #10 now.

Open the poll in a new window or tab then come back here when you’re done.