0% found this document useful (0 votes)
47 views2 pages

Worksheet 3.1 - Internet Safety, Cyber Securit

Uploaded by

mohamedj4
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views2 pages

Worksheet 3.1 - Internet Safety, Cyber Securit

Uploaded by

mohamedj4
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Internet safety, cyber security and encryption

3.1: Types of malware


Part 1
Fill in the ‘What I already know’ column with everything you already know about the six
types of malware in the table. Don’t worry if you don’t know a huge amount at the moment.
You’ll be filling in the other columns a bit later.
Part 2
Fill in the ‘How it gets on your system’ and ‘What it does’ columns using your new-found
expertise.

Type of malware What I already know How it gets on your system What it does

It damages data files Viruses typically spread Viruses can corrupt or


and may damage files. through infected email delete files, disrupt
attachments, malicious system functions, and
Virus
downloads, or infected spread to other files or
external storage devices systems.

A Trojan is a type of Trojan sometimes attract Trojans can steal


malware disguised as users to install malware by sensitive information,
Trojan legitimate software imitating trustworthy apps or create provide
by coming attached to safe unauthorized access to
software. the infected system.
And they spy on users
Worms commonly spread Worms have the ability
I think it eats your through network they can to spread to other linked
data and then if you exploit security vulnerabilities devices, eat up network
Worm want it back you have to spread quickly through bandwidth, and affect
networks. system performance.
to pay who ever did it.
They might also be
carrying the threat of
viruses as payloads.
is a type of malware that is often delivered through Ransomware encrypts
encrypts the victim's malicious email attachments, files, making them
Ransomware files or locks them out infected websites, or inaccessible to the user.
of their system, malicious downloads
demanding a ransom
payment in exchange for
restoring access.

Adware

Progress in Computing © Hodder & Stoughton Limited 2021


Internet safety, cyber security and encryption

It can see through Spyware can steal


your camera and . Spyware can be installed through your identity and
malicious email attachments,
that’s why they added infected websites, or bundled with personal information
Spyware legitimate software.
something on the and can see through
camera to block your your camera.
camera if you want.

Progress in Computing © Hodder & Stoughton Limited 2021

You might also like