Viruses, Worms, Trojans, and other Malware
Overview
Software installed on computers may have negative application to the user. It may not have been installed by the user intentionally. We will explore various types of malicious software that is installed on computers, how it works, and how to prevent it.
Purpose
Malicious software is often used to capture information from users, erase or steal data, and even use a computer as a part of a larger botnet army. Students should learn what happens when this type of software is installed, how it is installed with or without the user’s knowledge, and what can be done to prevent it.
Objectives
Students will be able to:
- Identify major forms of malicious software
- Identify effects of different types of software
- Determine best practice for preventing malicious software
Preparation
- Students will need access to research materials (internet)
- Students will need access to presentation software
Links
-
For the Teacher
-
For the Students
Vocabulary
Teaching Guide
Getting Started
- Video: Fighting Viruses, Defending the Net
- Video: Anatomy of an Attack: Ransomware
- Video: Anatomy of an Attack: Internet of Things
Activity
Have students form groups and research one of the specific types of malware. With each type students should be able to identify:
- What is unique about this type of malware?
- How does this type of malware typically get on a computer?
- What are the effects of this type of malware?
- What are the potential dangers in this type of malware?
- How do I remove this type of malware?
- What is the best practice to avoid this malware?
- What are some of the biggest events involving this type of malware? Famous examples.
The types of malware students should research:
- Virus
- Trojan Horse
- Worm
- Bot
- Adware
- Bug
- Rootkit
- Spyware
- Ransomware
- Fork Bomb
Students should present their information to the class.
Wrap-up
Discussion:
- What should be done to make sure computers are not infected?
- How would you advise your parents or grandparents to avoid infection?
- How do you know if you’ve been infected?
- What is the motive of those writing malicious software?
- Does it work? Do hackers get what they want from use of malware?
Assessment Questions
- What are the identifying characteristics of a virus?
- How did a Trojan Horse get it’s name?
- How are bots used by hackers?
Extended Learning
Standards Alignment
Indiana - CS3S-2.2 Indiana - CS3S-3.1
License
Cyber Security Curriculum is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.