Malware is malicious software (software that can harm devices)
It is installed on someone’s device without their knowledge and consent
Typical actions of malware
Deleting or modifying files
Scareware - e.g. scareware tells the user their computer is infected with many viruses to scare them into following malicious links or paying for problems to be fixed
Locking files
Spyware
Rootkits
Opening backdoors
What is scareware
Tactics used by malware to scare the user of the computer into following malicious links or paying to fix a problem
What does locking files involve
This is where ransomware encrypts all the files on a computer
The user receives a message demanding a large sum of money be paid in exchange for a decryption key
What is spyware
Malware that secretly monitors the users actions (e.g. key presses) and sends information to the hacker
What do rootkits do
They alter permissions, giving malware and hackers administrator-level access to devices
What are backdoors
They are holes in someone's security which can be used for future attacks
Different ways malware can access your device
Viruses
Worms
Trojans
How do viruses allow malware to access your device
Viruses attach to certain files (by copying themselves) e.g. .exe files and autorun scripts
Users spread them by copying infected files and activate them by opening infected files
How do worms allow malware to access your device
Worms are like viruses but they self-replicate without any user help (unlike viruses) , meaning they can spread very quickly
They exploit weaknesses in network security
How do trojans allow malware to access your device
Trojans are malware disguised as legitimate software
Unlike viruses and worms, malware don’t replicate themselves - users install them not realising they have a hidden purpose