Malware

Ransomware
Ransomware holds your data hostage and threatens to delete and damage it if money is not given.
1 of 8
Spyware
Spyware monitors users actions via key tracking and websites that have been visited. This malware tracks victims activity to discover personal data
2 of 8
Worm
A worm is a piece of malware that replicates itself onto other computers through a network and doesn't need human help like a virus
3 of 8
Virus
A virus is a piece of coding that is capable of copying itself and spreads when an infected file is opened
4 of 8
Malware
Malware (short for malicious software) is any software intentionally designed to cause damage to a computer, server or computer network. Malware does the damage after it is implanted or introduced in some way into a target's computer and can take the
5 of 8
Trojan horse
Trojan horse looks like a legitimate site or link but secretly steals your personal data through links and downloads.
6 of 8
Adware
Adware is malware that presents itself as unwanted advertisements to entice victims to click which allow the attacker to steal data
7 of 8
How to keep safe from malware
To keep safe from malware, you need to: keep anti-virus software up to date, only i use a trusted provider for anti-virus and do not open links that you do not know/trust.
8 of 8

Other cards in this set

Card 2

Front

Spyware monitors users actions via key tracking and websites that have been visited. This malware tracks victims activity to discover personal data

Back

Spyware

Card 3

Front

A worm is a piece of malware that replicates itself onto other computers through a network and doesn't need human help like a virus

Back

Preview of the back of card 3

Card 4

Front

A virus is a piece of coding that is capable of copying itself and spreads when an infected file is opened

Back

Preview of the back of card 4

Card 5

Front

Malware (short for malicious software) is any software intentionally designed to cause damage to a computer, server or computer network. Malware does the damage after it is implanted or introduced in some way into a target's computer and can take the

Back

Preview of the back of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Malware resources »