We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2
Internet safety, cyber security and encryption
3.1: Types of malware
Part 1 Fill in the ‘What I already know’ column with everything you already know about the six types of malware in the table. Don’t worry if you don’t know a huge amount at the moment. You’ll be filling in the other columns a bit later. Part 2 Fill in the ‘How it gets on your system’ and ‘What it does’ columns using your new-found expertise.
Type of malware What I already know How it gets on your system What it does
It damages data files Viruses typically spread Viruses can corrupt or
and may damage files. through infected email delete files, disrupt attachments, malicious system functions, and Virus downloads, or infected spread to other files or external storage devices systems.
A Trojan is a type of Trojan sometimes attract Trojans can steal
malware disguised as users to install malware by sensitive information, Trojan legitimate software imitating trustworthy apps or create provide by coming attached to safe unauthorized access to software. the infected system. And they spy on users Worms commonly spread Worms have the ability I think it eats your through network they can to spread to other linked data and then if you exploit security vulnerabilities devices, eat up network Worm want it back you have to spread quickly through bandwidth, and affect networks. system performance. to pay who ever did it. They might also be carrying the threat of viruses as payloads. is a type of malware that is often delivered through Ransomware encrypts encrypts the victim's malicious email attachments, files, making them Ransomware files or locks them out infected websites, or inaccessible to the user. of their system, malicious downloads demanding a ransom payment in exchange for restoring access.
your camera and . Spyware can be installed through your identity and malicious email attachments, that’s why they added infected websites, or bundled with personal information Spyware legitimate software. something on the and can see through camera to block your your camera. camera if you want.