5.3.1: understand the threat to digital systems posed by malware (viruses, worms, Trojans, ransomware, key loggers) and how hackers exploit technical vulnerabilities (unpatched software, out-of-date anti-malware) and use social engineering to carry out cyberattacks
Keyword | Definition |
---|---|
anti-malware | software which scans for malicious software so that it can be removed |
exploit | verb which means to take advantage of |
keylogger | software which keeps a record of every time a key is pressed or mouse is clicked in order to harvest personal information |
malicious hacker | someone who breaks into a computer system without permission or creates or shares malware |
malware | malicious software such as a virus, worm or trojan horse |
ransomware | malicious software that encrypts a computer and demands payment before the user can access their own files |
social engineering | tricking people into providing access to a computer system or network |
technical vulnerability | a security gap in code due to poor security design |
trojan | malicious software hidden inside another program that the user is tricked into downloading and running |
unpatched software | programs where vulnerabilities have been identified but not yet updated |
virus | malicious software that infect a computer system then spread out to infect other computer systems |
worm | malicious software that can create copies of itself and spread by itself without needing an infected host computer |