IDENTIFYING POTENTIAL
SECURITY RISKS
By Samuel coghlan-white
SPAM
• Spamming is when somebody sends emails or messages to someone. They
normally consist of advertising and phishing
• These messages are usually consistent and unwanted
• Sometimes these messages can contain viruses
ADWARE
• Adware is a advertising program that can track peoples private information
such as search history
• This information shows advertisements based on your personal information
• This software is often unwilling and unknowingly downloaded onto a users
system
SPYWARE
• The definition of spyware is a piece of software that secretly installs itself
onto the user s system
• This software usually collects information for third party use
• This is also called a Trojan horse which disguises itself as different software
to trick the user
• It is normally used by companies to get information about there customers
WORM
• A computer worm is software that speeds and copies itself, it does without
changing any files
• It travels over networks, emails and USB drives

Identifying potential security risks

  • 1.
  • 2.
    SPAM • Spamming iswhen somebody sends emails or messages to someone. They normally consist of advertising and phishing • These messages are usually consistent and unwanted • Sometimes these messages can contain viruses
  • 3.
    ADWARE • Adware isa advertising program that can track peoples private information such as search history • This information shows advertisements based on your personal information • This software is often unwilling and unknowingly downloaded onto a users system
  • 4.
    SPYWARE • The definitionof spyware is a piece of software that secretly installs itself onto the user s system • This software usually collects information for third party use • This is also called a Trojan horse which disguises itself as different software to trick the user • It is normally used by companies to get information about there customers
  • 5.
    WORM • A computerworm is software that speeds and copies itself, it does without changing any files • It travels over networks, emails and USB drives