大象传媒

Cyberspace, network security and data transfer - CCEAMalware

Networks make computers more powerful, but also more vulnerable to attack. In the era of the internet and cloud computing, what are the threats to data security?

Part of Digital Technology (CCEA)Digital technology (compulsory)

Malware

By combining the words malicious (meaning harmful) and software, we get the word ''. Viruses are just one type of malware. Other types include spyware, and .

Virus

A virus is a program designed to disrupt a system by gaining access to your device. It can copy your personal data, delete your files or slow your device down. A virus spreads by duplicating and attaching itself to other files.

Spyware

Spyware is software that allows a user to obtain information about another's computer activities by stealth. It installs software and transmits information such as browsing habits secretly to a third party.

Phishing

is the act of trying to obtain financial or other confidential records such as passwords from internet users. Emails that look like they are from a legitimate, respected organisation are sent, but they contain links to fake websites that 'phish' data from unsuspecting victims.

Trojan

In computing, Trojan refers to any malicious computer program which is used to hack into a computer by misleading users as to its true intentions. They are often hidden in downloads such as free online computer games.

Worm

A worm is a computer program that makes lots of copies of itself, like a virus. The main difference between the two is that a virus attaches itself to another computer program, but a worm works by itself. As well as copying itself, it can be made to do all sorts of things, like delete files or send emails to everyone in a user's address book.

Keylogging software

Keylogging software is designed to record and store every keystroke made on your computer. Criminals often attempt to install keylogging software onto your computer remotely. A keylogger is often used to steal passwords and personal data without the person knowing it's happening.

A keylogger can be combined with a communication program so that each keystroke is sent to a remote computer over the internet when the target computer is online.