Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)
Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)

Start this free course now. Just create an account and sign in. Enrol and complete the course for a free statement of participation or digital badge if available.

Free course

Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)

1.2 Obtaining Sophos Threatsaurus

This section is part of the amber and green pathways.

There are lots of technical terms relating to cyber security and it can be difficult to keep track of what’s what.

Sophos is one of the major players in the anti-malware business. They publish a Threatsaurus to help you remember and define the terms relating to malware. The Threatsaurus is a plain-English guide, to help IT managers and end users understand the threats posed by malicious software. The Threatsaurus includes:

  • an A–Z glossary on computer and data security threats
  • practical tips to stay safe from email scams, identity theft, malware and other threats
  • a guide to Sophos’s security software and hardware.

Download the Sophos Threatsaurus PDF [Tip: hold Ctrl and click a link to open it in a new tab. (Hide tip)]   or from the Sophos website.

Save it, and print it out if you need to, so that you can refer to it throughout the course. You’ll use it again in Week 3.

Malware

Finally, there are a number of terms associated with software that attempts to harm computers in different ways. Collectively these are known as ‘malware’ (a contraction of malicious software).

This composite image shows three icons representing different types of malware, arranged in a triptych. The first icon is labelled 'Ransomware' and shows a padlocked case, with a dollar sign imposed on it. The second icon is labelled 'Spyware' and shows a laptop screen with a suspicious, shadowy face upon it, implied to be 'spying' on the computer activity. The third icon is 'labelled' botnets and shows an angry cartoon robot face in the center, with many lines leading out to smaller connected robots, representing computers that have been taken over by the malware.
Figure 6 Types of malware

Depending on what the malware does, different terms are used to in relation to malware. For example:

  • ransomware is malware that demands payment in order to refrain from doing some harmful action or to undo the effects of the harmful action
  • spyware records the activities of the user, such as the passwords they type into the computer, and transmits this information to the person who wrote the malware
  • botnets are created using malware that allows an attacker to control a group of computers and use them to gather personal information or launch attacks against others, such as for sending spam emails or flooding a website with so many requests for content that the server cannot cope, called a denial-of-service attack.

You’ll learn more about malware in Week 3.

Now that you understand some of the basic concepts and terminology, you’ll use this knowledge to study real examples of cyber security breaches.

CYBER_B2

Take your learning further

Making the decision to study can be a big step, which is why you'll want a trusted University. The Open University has 50 years’ experience delivering flexible learning and 170,000 students are studying with us right now. Take a look at all Open University courses.

If you are new to University-level study, we offer two introductory routes to our qualifications. You could either choose to start with an Access module, or a module which allows you to count your previous learning towards an Open University qualification. Read our guide on Where to take your learning next for more information.

Not ready for formal University study? Then browse over 1000 free courses on OpenLearn and sign up to our newsletter to hear about new free courses as they are released.

Every year, thousands of students decide to study with The Open University. With over 120 qualifications, we’ve got the right course for you.

Request an Open University prospectus371