Cards (11)

    • Malware
      • Malware is malicious software (software that can harm devices)
      • It is installed on someone’s device without their knowledge and consent
    • Typical actions of malware
      • Deleting or modifying files 
      • Scareware - e.g. scareware tells the user their computer is infected with many viruses to scare them into following malicious links or paying for problems to be fixed
      • Locking files 
      • Spyware 
      • Rootkits 
      • Opening backdoors
    • What is scareware
      Tactics used by malware to scare the user of the computer into following malicious links or paying to fix a problem
    • What does locking files involve
      • This is where ransomware encrypts all the files on a computer 
      • The user receives a message demanding a large sum of money be paid in exchange for a decryption key
    • What is spyware
      Malware that secretly monitors the users actions (e.g. key presses) and sends information to the hacker
    • What do rootkits do
      They alter permissions, giving malware and hackers administrator-level access to devices
    • What are backdoors
      They are holes in someone's security which can be used for future attacks
    • Different ways malware can access your device
      • Viruses 
      • Worms 
      • Trojans
    • How do viruses allow malware to access your device
      • Viruses attach to certain files (by copying themselves) e.g. .exe files and autorun scripts 
      • Users spread them by copying infected files and activate them by opening infected files
    • How do worms allow malware to access your device
      • Worms are like viruses but they self-replicate without any user help (unlike viruses) , meaning they can spread very quickly 
      • They exploit weaknesses in network security
    • How do trojans allow malware to access your device
      • Trojans are malware disguised as legitimate software 
      • Unlike viruses and worms, malware don’t replicate themselves - users install them not realising they have a hidden purpose