Introducing
Your new presentation assistant.
Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.
Trending searches
Software which is specifically designed to disrupt, damage, or gain unauthorised access to a computer system.
The term 'virus' has been incorrectly used as a blanket term for malware
There are many different types of malware that we will explore in this lesson.
Manipulating vulnerabilities in DNS or installing software to re-direct a genuine request for a web page to another, fake site.
What is malware?
The act of misleading people into parting with confidential data.
Malicious code designed to spread from host to host
Needs to be attached to a host file or document and executed by the user or will remain dormant
Anti-virus software needs to be kept up to date as new code is written and released every single day
Spyware - Software designed to spy on and record your activities, such as a key logger or screen shot grabber
Ransomware - malware that encrypts your files and asks for money in order to decrypt them. Usually a set period of time before files are deleted
Scare ware - Threatens the user with a false claim in the hope that they will pay a fee.
Particularly annoying!
Internal threats as well as external!
- Includes looking at files you don't normally have permission to view
- modifying or deleting files without permission
Different to a virus in the sense that it is a stand alone program - It doesn't need a host to spread
Doesn't necessarily change files system, but replicate themselves over and over to disable the system.
http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
Use the worksheet to create an answer to the question using all of the key terms
To understand the different threats to computer systems
To understand that malware does not just refer to viruses
3 Personal attributes
2 types of VDU
1 explanation of the hexadecimal number system
The manipulation of individuals to extract sensitive information
IT systems face many threats
It could be someone calling and asking for username and password to check your computer for viruses
Some threats come with malicious intent, others are a result of accidents, failures or user error.
Create a threat flashcard quiz.
Write the definition on one side and the category on the other.
Use these to test each others knowledge on this area
Removing copies of files/data from a system
Not always hacking - Can be performed by legitimate users of the network
Interception is when data packets are intercepted by a third party, copied, edited or re-directed to a new location
A piece of code that manifests itself as serving a legitimate purpose, but contains malicious code to delete, edit or take down a system
Eavesdropping is a form of interception, but refers to listening in to traffic not intended for the reader such as an email or IM.
Known to create a 'back door' into your computer allowing hackers to access your data