Forms of Attack - Malware
Six types of malware. They look similar in questions but have precise, examinable differences. By the end of this lesson you'll be able to name, define and distinguish all six - and avoid the most common exam mistakes.
You open an email attachment - a CV from a job applicant. Nothing seems to happen. The document closes. You carry on with your day. Three days later, every file on the school network is encrypted and a message demands £15,000 in Bitcoin. You have 72 hours.
Questions about malware appear in virtually every paper. The most commonly lost marks are students writing "a virus spreads through a network automatically" (that's a worm) or "a trojan self-replicates" (it doesn't). Precision with malware definitions is a guaranteed mark opportunity.
What is malware?
Malware is an umbrella term for any software deliberately designed to disrupt, damage, gain unauthorised access to, or extract data from a computer system. The word combines "malicious" and "software".
There are six types you need to know for GCSE Computer Science. They differ in three key ways: how they spread, what they do once installed, and whether they replicate.
The six malware types - click each to expand
Each type has specific characteristics. Click to expand, read the exam tip, and note the common misconception.
How malware spreads - the key distinction
The most tested distinction in malware questions is how each type spreads. There are three spread mechanisms - and knowing which applies to which malware type is the difference between full and partial marks.
Virus - only spreads when an infected file is opened or shared by a user
Worm - replicates and spreads without any human involvement
Trojan - user installs it, thinking it is legitimate software
Ransomware, Spyware, Keylogger - often delivered via trojans, phishing or downloads
Drag each description into the correct category:
Real-world malware: famous cases
These incidents are real. Understanding how they happened links exam theory to practice - and examiners love scenario questions based on real-world attacks.
How a ransomware attack unfolds
Ransomware does not appear from nowhere. It follows a predictable sequence of stages. Click through to see each stage, what the attacker does, and what the victim experiences.
A hospital is targeted by malware that encrypts patient records. The hospital pays the ransom but the attackers do not provide the decryption key. Explain two reasons why paying the ransom is not recommended.
Reason 2 - Encourages further attacks: Paying confirms to attackers that the target is willing to pay. This makes the organisation a target for future attacks, and funds the attacker's criminal activity, enabling them to target other organisations. It also signals to other criminal groups that ransomware attacks on hospitals are profitable.
Practice what you have learned
Three levels of worksheet for this lesson. Download, print and complete offline.