Skip to content

Latest commit

 

History

History
77 lines (61 loc) · 3.2 KB

malware.md

File metadata and controls

77 lines (61 loc) · 3.2 KB

Viruses, Worms, Trojans, and other Malware

Overview

Software installed on computers may have negative application to the user. It may not have been installed by the user intentionally. We will explore various types of malicious software that is installed on computers, how it works, and how to prevent it.

Purpose

Malicious software is often used to capture information from users, erase or steal data, and even use a computer as a part of a larger botnet army. Students should learn what happens when this type of software is installed, how it is installed with or without the user's knowledge, and what can be done to prevent it.

Objectives

Students will be able to:

  • Identify major forms of malicious software
  • Identify effects of different types of software
  • Determine best practice for preventing malicious software

Preparation

  • Students will need access to research materials (internet)
  • Students will need access to presentation software

Links

Vocabulary

Teaching Guide

Getting Started

Activity

Have students form groups and research one of the specific types of malware. With each type students should be able to identify:

  • What is unique about this type of malware?
  • How does this type of malware typically get on a computer?
  • What are the effects of this type of malware?
  • What are the potential dangers in this type of malware?
  • How do I remove this type of malware?
  • What is the best practice to avoid this malware?
  • What are some of the biggest events involving this type of malware? Famous examples.

The types of malware students should research:

  • Virus
  • Trojan Horse
  • Worm
  • Bot
  • Adware
  • Bug
  • Rootkit
  • Spyware
  • Ransomware
  • Fork Bomb

Students should present their information to the class.

Wrap-up

Discussion:

  • What should be done to make sure computers are not infected?
  • How would you advise your parents or grandparents to avoid infection?
  • How do you know if you've been infected?
  • What is the motive of those writing malicious software?
  • Does it work? Do hackers get what they want from use of malware?

Assessment Questions

  • What are the identifying characteristics of a virus?
  • How did a Trojan Horse get it's name?
  • How are bots used by hackers?

Extended Learning

Standards Alignment

Indiana - CS3S-2.2 Indiana - CS3S-3.1

License

Cyber Security Curriculum Creative Commons License is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.