Lesson video

In progress...

Loading...

Hello, my name is Mrs. Holborow and welcome to Computing.

I'm so pleased that you've decided to join me for the lesson Today.

In today's lesson, we're going to be learning about malware and how malware attacks computer systems. Welcome to today's lesson from the Unit, Cyber threats and security.

This lesson is called "Malware: malicious software." And by the end of today's lesson, you'll be able to describe malware and explain how it attacks systems. Shall we make a start? We will be exploring these keywords in today's lesson.

Shall we take a look at them now? Malware.

Malware.

Any software designed to harm, exploit or secretly control a computer system, network or device.

Stealing.

Stealing the act of taking something that doesn't belong to you without permission and with no intention of giving it back.

Infect.

Infect.

To spread something harmful like a virus or malware into a system.

Ransom.

Ransom.

The money cyber criminals demand after locking files or systems. Look out for these keywords throughout today's lesson.

Today's lesson is broken down into two parts.

We'll start by describing malware and then we'll move on to explain how malware attacks systems. Let's make a start by describing malware.

Aisha says, "I found a USB memory stick just outside the school.

What should I do with it?" What would you recommend that Aisha does? Maybe pause the video whilst you have a think.

Sam says, "I wonder what's on it and who it belongs to? We could give it back to them.

Let's plug into the computer!" Andeep says, "Wait! I'm not sure that's a good idea.

Maybe we should hand it to a teacher, so it can be checked." Aisha says, "I'm not sure what to do.

I want to know what's on the USB stick and who it belongs to, but maybe it's safer to hand it into a teacher." What option would you choose? Option one, plug it into a computer.

Or option two, hand it into a teacher.

Maybe pause the video whilst you have a think about what you would do.

Let's explore what happened.

Option one, you plug it into a computer to try and find out who it belongs to.

When you plug it in, the light starts flashing instantly, but no file explorer window appears.

Then you see a red screen appear with a message saying that the data on the school network has been encrypted.

As you look around the room, you see the same message appear on all the computers in the room.

By plugging in the USB stick without getting it checked, a security breach has happened.

Option two, you walk past a teacher on duty, explain the situation and hand over the USB stick to them.

The teacher passes it to the IT support team.

The network manager runs it through a special piece of software that scans it for malware before any executable files are allowed to be exposed to the network.

They find that the USB drive contains malware that would've infected the entire school network.

By handing in the USB stick to the teacher, a security breach has been prevented.

Aisha says, "I'm really pleased I chose option two and gave the USB stick to a teacher.

The network manager found that the USB stick contained malware that would have caused all of the school's data to be encrypted." Sam says, "That was a good choice, Aisha.

I didn't realise that the USB stick might harm the school network.

Did you say malware? What's that?" Malware or malicious software is software that is designed to gain access to your computer with malicious intent.

Malware can infect whole networks or a single digital device.

Malicious intent includes things like, disabling hardware, stealing data, forced advertising, sending email spam, or extorting money.

Malware is any programme or file that is created to damage, steal from, or take control of a computer system without the user's permission.

Malware is created by cyber criminals for their own personal gain or to cause harm.

However, not all malware is created by cyber criminals for the same reason.

Black hat hackers may want to steal money, data, or personal information.

Hacktivists may want to make a political statement.

Cyberspies may intend to gain secret information for governments or companies.

Time to check your understanding.

Malware is A, a harmless file on a computer.

B, software designed to harm or steal data.

Or C software that is difficult to instal.

Pause the video whilst you have a think.

Did you select B? Well done.

Malware is software designed to harm or steal data.

True or false? Malware can infect whole networks of devices or single digital devices.

Pause the video whilst you have a think.

Did you select true? That's right.

Well done.

Andeep says, "So, USB devices can infect a system with malware, but what other ways can it happen?" Infected files can be downloaded from unsafe websites, email attachments, or fake apps by accident.

Clicking a link on a fake or hacked website can download malware and infect a system.

Pirated or fake software can often contain hidden malware.

Using outdated software or failing to use antivirus protection increases the risk of malware infecting a system.

Connecting to unsafe wifi networks can allow attackers to send malware through public networks.

Once malware gets into a system, it can hide, spread and start doing damage.

Malware can cause serious damage such as data loss, system failure, or financial loss.

True or false? Connecting to unsafe Wi-Fi networks can allow an attacker to send malware through public networks.

Pause the video whilst you have a think.

That's right, that's true.

And often companies restrict individuals from connecting to unsafe Wi-Fi networks.

And if you do connect to a Wi-Fi network, they may suggest you use a secure VPN to do so.

Okay, we've come to the first task of today's lesson and I'd like you to explain what is malware? And how can it affect a computer network? Pause the video whilst you have a go at answering the question.

How did you get on? Did you manage to answer the question? Well done.

Let's have a look at a sample answer together.

"Malware is short for malicious software.

Malware is any type of software that is designed to cause harm, steal information, or disrupt a computer or network.

Once a device or network is infected with malware, it could disable hardware, steal data, send email spam, or ask for a ransom to unlock files or systems. There are lots of ways malware can infect devices such as through malicious downloads, email attachments, fake or hacked websites or unsafe networks." Remember, if you need to pause your video and add extra detail to your answer, you can do that now.

So, far we've described malware.

We are now going to move on to explain how malware attacks systems. There are many types of malware.

Do you know of any? Maybe pause the video whilst you have a quick think.

Did you think of any types of malware? Let's have a look at some together now.

So, viruses, spyware, ransomware, Trojans, adware, and worms. Did you have any of those? Are any of these terms familiar to you? Each type of malware works differently depending on what they are designed to do.

They often trick users into downloading or installing them in order to infect the system.

Viruses are a malicious form of self replicating software.

Once a computer or network is infected, the virus will replicate itself by maliciously modifying other computer programmes and inserting code.

Worms replicate themselves but do not attach themselves to files like a virus does.

Instead, worms spread through the network and use the system's resources.

Most worms cause problems by using up network bandwidth and therefore slowing down the network significantly.

A Trojan is a piece of software that appears to perform a useful function, such as a game or an update.

Trojan malware is named after the Trojan Horse story, as it disguises itself as something harmless to trick users into allowing it into their system just as the wooden horse was used to secretly infiltrate Troy.

Ransomware is a form of virus that takes advantage of a security vulnerability in an operating system, application, or any other software code.

Ransomware locks a computer, encrypts files, and prevents the user from being able to access the data until a ransom is paid.

Time to check your understanding.

What do viruses and worms have in common? Is it A, they're both self-replicating.

B, they both encrypt data.

Or C, they both display unwanted adverts.

Pause the video whilst you have a think.

Did you select A? Well done.

Both worms and viruses are self-replicating.

Spyware is unwanted software that monitors and gathers information on a person and how they use their computer.

This can include monitoring your internet usage to send you harmless but annoying adverts.

More sinister spyware will include key loggers that record every keystroke made by a user.

Adware refers to software that has advertisements embedded in the application.

This is not always a bad thing and is considered a legitimate alternative that can be offered to consumers who do not wish to pay for software.

Adware can become a problem when it goes beyond showing harmless ads and starts affecting your device or privacy.

Adware becomes malware when it invades privacy, reduces performance, or is designed to instal itself and be difficult to uninstall.

Time to check your understanding.

Which type of malware hides inside software that appears to be useful? Is it A, worm.

B, Trojan.

Or C, virus.

Pause the video whilst you have a think.

Did you select Trojan? Well done.

Remember the story of the Trojan Horse? Which type of malware encrypts files and prevents access to the data until the victim has paid? Is it A, worm.

B, Trojan.

Or C, ransomware.

Pause the video whilst you have a think.

That's right, the correct answer is C, ransomware.

Okay, we are moving on to our final task of today's lesson.

I'd like you to complete the table to describe the methods of attack for each type of malware.

So we have virus, worm, spyware, ransomware, Trojan, and adware.

Pause the video whilst you complete the table.

How did you get on? Did you manage to complete the table? Well done.

Let's have a look at some sample answers together.

So for virus, the method of attack is replicates itself by modifying other programmes and inserting code.

A worm spreads through the network and uses the systems' resources.

Spyware gathers information on a person and how they use their computer.

Ransomware locks a computer, encrypts files, and prevents access to data until a ransom is paid.

Trojan disguises itself as something harmless to trick users into allowing it onto their system.

Adware is installed with other applications.

Remember, if you need to pause your video here and add any extra detail to your table, you can do that now.

We've come to the end of today's lesson, "Malware: malicious software," and you've done a fantastic job, so well done.

Let's summarise what we've learned together during today's lesson.

Malware is malicious software designed to infect, harm, steal or disrupt computer systems. Malware can cause serious damage such as data loss, system failure, or financial loss.

There are different types of malware including viruses, worms, Trojans, ransomware, spyware, and adware.

Each type of malware works differently, but they often trick users into downloading or installing them.

I hope you've enjoyed today's lesson, and I hope you join me again soon.

Bye.