Skip to content
Skip to main content

About this free course

Download this course

Share this free course

Introduction to cyber security: stay safe online
Introduction to cyber security: stay safe online

Start this free course now. Just create an account and sign in. Enrol and complete the course for a free statement of participation or digital badge if available.

1.3 Defining terms

An image shows a person using a laptop which is sitting on top of a pile of books.
Figure 4

In addition to the types of malware described in the previous sections, ‘Adware’, that forces users to view advertising, and ‘Spyware’, malware that attempts to access personal information and user passwords, are other examples you may have heard about.

From the Sophos Threatsaurus PDF downloaded in Week 1 (https://ugc.futurelearn.com/ uploads/ files/ 3f/ d3/ 3fd36a66-d941-4595-b587-1a7b41998ae9/ Week_3_Sophos_Threatsaurus_AZ.pdf [Tip: hold Ctrl and click a link to open it in a new tab. (Hide tip)] ) , look for a term that you have not come across before.

Try to think of a way to define the term in your own words.

You could also look at examples or information from the sources recommended in Week 1, Section 2.2, How to keep up to date.