Cards (11)

  • Malware
    • Malware is malicious software (software that can harm devices)
    • It is installed on someone’s device without their knowledge and consent
  • Typical actions of malware
    • Deleting or modifying files 
    • Scareware - e.g. scareware tells the user their computer is infected with many viruses to scare them into following malicious links or paying for problems to be fixed
    • Locking files 
    • Spyware 
    • Rootkits 
    • Opening backdoors
  • What is scareware
    Tactics used by malware to scare the user of the computer into following malicious links or paying to fix a problem
  • What does locking files involve
    • This is where ransomware encrypts all the files on a computer 
    • The user receives a message demanding a large sum of money be paid in exchange for a decryption key
  • What is spyware
    Malware that secretly monitors the users actions (e.g. key presses) and sends information to the hacker
  • What do rootkits do
    They alter permissions, giving malware and hackers administrator-level access to devices
  • What are backdoors
    They are holes in someone's security which can be used for future attacks
  • Different ways malware can access your device
    • Viruses 
    • Worms 
    • Trojans
  • How do viruses allow malware to access your device
    • Viruses attach to certain files (by copying themselves) e.g. .exe files and autorun scripts 
    • Users spread them by copying infected files and activate them by opening infected files
  • How do worms allow malware to access your device
    • Worms are like viruses but they self-replicate without any user help (unlike viruses) , meaning they can spread very quickly 
    • They exploit weaknesses in network security
  • How do trojans allow malware to access your device
    • Trojans are malware disguised as legitimate software 
    • Unlike viruses and worms, malware don’t replicate themselves - users install them not realising they have a hidden purpose