These resources will be removed by end of Summer Term 2025.
Switch to our new teaching resources now - designed by teachers and leading subject experts, and tested in classrooms.
Lesson details
Key learning points
- In this lesson, we will learn about malware and the different categories of malware, as well as understanding how they work and the damage they can do.
Licence
This content is made available by Oak National Academy Limited and its partners and licensed under Oak’s terms & conditions (Collection 1), except where otherwise stated.
Loading...
5 Questions
Q1.
‘Gaining unauthorised access to or control of a computer system’ is a definition of which type of cybercrime?
DDoS attack
Penetration testing
Social engineering
Q2.
What is the term for people who are paid to legally hack into computer systems with the sole purpose of helping a company identify weaknesses in their system?
Ethical hackers
Legal hackers
System administrators
Q3.
What is the purpose of a DDoS attack?
To use a single computer to flood a network or server with internet traffic in order to disrupt service
To use a single computer to infiltrate a network in order to steal data or to plant a virus
To use multiple computers to infiltrate a network in order to steal data or to plant a virus
Q4.
Which one of the following UK laws would a DDoS attack violate?
The Copyright, Designs and Patents Act
The Data Protection Act
The Freedom of Information Act
Q5.
A hackers successfully hacks into a bank account and transfers money into another account whilst they are there. Which section of the Computer Misuse Act would this contravene?
Section 1
Section 3
5 Questions
Q1.
Which of the following two are types of malware?
Anti-virus
Firewall
Q2.
What is the definition of a computer virus?
Malicious software that disguises itself as something else
Malicious software that monitors every keystroke the user makes
Malicious software that uses network bandwidth to deliberately disrupt the speed of the network
Q3.
Which of the following statements best describes a "worm"?
Attaches to files and is designed to take up system resources to slow down the network or computer. Does not self replicate.
Malicious software that monitors every keystroke the user makes
Self replicates and encrypts files to make them inaccessible
Q4.
The Wannacry virus was an example of which type of attack?
Brute force
DDoS
Spyware
Q5.
Which one of the following wouldn't an internet bot perform?
Brute force
DDoS attack
Finding new websites for search engines to index