Edexcel GCSE Computer Science 2020

5.3.1: understand the threat to digital systems posed by malware (viruses, worms, Trojans, ransomware, key loggers) and how hackers exploit technical vulnerabilities (unpatched software, out-of-date anti-malware) and use social engineering to carry out cyberattacks

Keywords:
Issues and impact
Test your self on these keywords and definitions using the games below or Play random game
KeywordDefinition
anti-malwaresoftware which scans for malicious software so that it can be removed
exploitverb which means to take advantage of
keyloggersoftware which keeps a record of every time a key is pressed or mouse is clicked in order to harvest personal information
malicious hackersomeone who breaks into a computer system without permission or creates or shares malware
malwaremalicious software such as a virus, worm or trojan horse
ransomwaremalicious software that encrypts a computer and demands payment before the user can access their own files
social engineeringtricking people into providing access to a computer system or network
technical vulnerabilitya security gap in code due to poor security design
trojanmalicious software hidden inside another program that the user is tricked into downloading and running
unpatched softwareprograms where vulnerabilities have been identified but not yet updated
virusmalicious software that infect a computer system then spread out to infect other computer systems
wormmalicious software that can create copies of itself and spread by itself without needing an infected host computer
Keyword games:
Resources: