Network security and cybersecurity - EdexcelMalware

Networks operate on the principles of communication and sharing. That means network traffic and data could be accessed by people who have no authority to do so. Enhanced security measures can help to prevent cyberattacks.

Part ofComputer SciencePrinciples of computer science

Malware

Malware is malicious that is designed to a system. Malware can take many different forms.

The different forms of malware including worms, viruses, spyware, Trojans and ransomware
Malware threatDescription
VirusesPrograms embedded (hidden) within other files. They replicate themselves and become part of other programs. Viruses often cause damage by deleting or modifying data.
WormsPrograms similar to viruses except that they are not hidden within other files. Worms often spread through emails.
TrojansPrograms which pretend to be legitimate but in reality are malware. They are often disguised as email attachments. Trojans cannot spread by themselves - instead they deceive a user into installing the program.
SpywarePrograms that monitor user activities (such as websites visited, usernames and passwords used) and send the information back to a hacker.
RansomwarePrograms that attempt to blackmail a user into making a payment to a hacker. Some types of ransomware do little but try to scare users into paying, while others go further - they encrypt documents and will not decrypt them until a ransom is paid.
KeyloggersKey loggers are programs that capture user input (Data which is inserted into a system for processing and/or storage). This data is then sent on to people with malicious intent.
Malware threatViruses
DescriptionPrograms embedded (hidden) within other files. They replicate themselves and become part of other programs. Viruses often cause damage by deleting or modifying data.
Malware threatWorms
DescriptionPrograms similar to viruses except that they are not hidden within other files. Worms often spread through emails.
Malware threatTrojans
DescriptionPrograms which pretend to be legitimate but in reality are malware. They are often disguised as email attachments. Trojans cannot spread by themselves - instead they deceive a user into installing the program.
Malware threatSpyware
DescriptionPrograms that monitor user activities (such as websites visited, usernames and passwords used) and send the information back to a hacker.
Malware threatRansomware
DescriptionPrograms that attempt to blackmail a user into making a payment to a hacker. Some types of ransomware do little but try to scare users into paying, while others go further - they encrypt documents and will not decrypt them until a ransom is paid.
Malware threatKeyloggers
DescriptionKey loggers are programs that capture user input (Data which is inserted into a system for processing and/or storage). This data is then sent on to people with malicious intent.