Malware & Software Threats
Understanding exactly how malicious software attacks hardware, networks, and data.
What is Malware?
"Malware" is simply a generic, umbrella term for Malicious Software. It describes any program or code designed to cause harm, steal data, or gain unauthorised access to a system.
Examiner's Eye - Avoid the Trap!
The "Malware / Virus Generalisation" Trap: Do not simply write "Malware" or "it's a virus" as a blanket generic answer to an exam scenario. If an exam scenario asks for a specific threat (e.g., a hospital is locked out of their patient records and asked to pay), you must name the precise, specific type of malware (Ransomware) and describe its specific action (encrypts the data).
Concept Explorer: The Infection Sandbox
Malware requires a delivery mechanism. Trigger one of the risky actions below to observe how different types of malware behave once they successfully breach a system.
Trigger Action
Victim System Status
The 5 Specific Types of Malware
Virus
Software that attaches itself to legitimate files. It replicates itself and spreads when a user opens the infected file. Its goal is direct damage (deleting or corrupting files, or filling up hard drive space).
Worm
A standalone program that quickly replicates itself across a network without any user action required. Its specific goal is usually to consume all available network bandwidth to slow down or crash the network entirely.
Trojan
Malware disguised as legitimate, harmless software (e.g. a free game download). It cannot replicate itself. It relies entirely on tricking the user into manually installing it, after which it performs its malicious actions in the background.
Ransomware
Malware that forcefully encrypts or locks a user's files so they cannot be accessed. The attacker then demands a direct financial fee (a ransom), usually in cryptocurrency, in exchange for the decryption key to permanently unlock the data.
Spyware & Keyloggers
Software designed to remain completely hidden and undetected. A Keylogger secretly records every physical keystroke typed by the user (capturing plaintext passwords and credit card numbers) and silently transmits this data back to a third-party attacker.
Check Your Understanding
A student downloads a free cracked version of Photoshop from an untrusted forum. When they launch it, it installs a hidden payload that allows a hacker remote access to their PC. Which specific type of malware is this?
Stretch & Challenge (AO2 Application)
Written Exam Scenario (AO2/AO3)
...