5.3.1: understand the threat to digital systems posed by malware (viruses, worms, Trojans, ransomware, key loggers) and how hackers exploit technical vulnerabilities (unpatched software, out-of-date anti-malware) and use social engineering to carry out cyberattacks
| Keyword | Definition |
|---|---|
| anti-malware | software which scans for malicious software so that it can be removed |
| exploit | verb which means to take advantage of |
| keylogger | software which keeps a record of every time a key is pressed or mouse is clicked in order to harvest personal information |
| malicious hacker | someone who breaks into a computer system without permission or creates or shares malware |
| malware | malicious software such as a virus, worm or trojan horse |
| ransomware | malicious software that encrypts a computer and demands payment before the user can access their own files |
| social engineering | tricking people into providing access to a computer system or network |
| technical vulnerability | a security gap in code due to poor security design |
| trojan | malicious software hidden inside another program that the user is tricked into downloading and running |
| unpatched software | programs where vulnerabilities have been identified but not yet updated |
| virus | malicious software that infect a computer system then spread out to infect other computer systems |
| worm | malicious software that can create copies of itself and spread by itself without needing an infected host computer |