{"id":501,"date":"2018-01-25T14:35:06","date_gmt":"2018-01-25T14:35:06","guid":{"rendered":"http:\/\/teachcomputerscience.com\/?p=501"},"modified":"2024-07-24T11:16:49","modified_gmt":"2024-07-24T11:16:49","slug":"hacking-and-malware","status":"publish","type":"post","link":"https:\/\/teachcomputerscience.com\/hacking-and-malware\/","title":{"rendered":"Hacking and Malware"},"content":{"rendered":"<div class=\"gb-container gb-container-d0ce6e85 upsell-block\"><div class=\"gb-inside-container\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-28f63763\">\n<div class=\"gb-grid-column gb-grid-column-1f65a409\"><div class=\"gb-container gb-container-1f65a409\"><div class=\"gb-inside-container\">\n\n<h2 class=\"gb-headline gb-headline-4ffffb71 gb-headline-text\">GCSE Computer Security and Ethics (14-16 years)<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>An editable PowerPoint lesson presentation<\/li><li>Editable revision handouts<\/li><li>A glossary which covers the key terminologies of the module<\/li><li>Topic mindmaps for visualising the key concepts<\/li><li>Printable flashcards to help students engage active recall and confidence-based repetition<\/li><li>A quiz with accompanying answer key to test knowledge and understanding of the module<\/li><\/ul>\n\n\n<div class=\"gb-button-wrapper gb-button-wrapper-ef9c8926\">\n\n<a class=\"gb-button gb-button-b81eda63 gb-button-text\" href=\"https:\/\/teachcomputerscience.com\/gcse\/security\/\">View GCSE Computer Security and Ethics  Resources<\/a>\n\n<\/div>\n<\/div><\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-de9520be\"><div class=\"gb-container gb-container-de9520be\"><div class=\"gb-inside-container\">\n\n<h2 class=\"gb-headline gb-headline-2029c046 gb-headline-text\">A-Level Moral and ethical Issues (16-18 years)<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>An editable PowerPoint lesson presentation<\/li><li>Editable revision handouts<\/li><li>A glossary which covers the key terminologies of the module<\/li><li>Topic mindmaps for visualising the key concepts<\/li><li>Printable flashcards to help students engage active recall and confidence-based repetition<\/li><li>A quiz with accompanying answer key to test knowledge and understanding of the module<\/li><\/ul>\n\n\n<div class=\"gb-button-wrapper gb-button-wrapper-10356288\">\n\n<a class=\"gb-button gb-button-3359f00b gb-button-text\" href=\"https:\/\/teachcomputerscience.com\/a-level\/legal-moral-cultural-and-ethical-issues\/moral-and-ethical-issues\/\">View A-Level Moral and ethical Issues Resources<\/a>\n\n<\/div>\n<\/div><\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n\n<h2 class=\"wp-block-heading\">Understanding Hacking and Malware: Hacking<\/h2>\n\n\n\n<p>Hacking is an endeavor to abuse a computer system or a private network in a computer. \u00a0It is illegal to access or to take control over computer network security systems for some dishonest purpose.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Hackers<\/h3>\n\n\n\n<p>Hackers are intelligent people and highly skilled in computers. &nbsp;It requires more intelligence and expertise to break a security system than to create one.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Categorization of Hackers<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>White hat professionals \u2013 they hack to evaluate their own security systems to make it more hack-proof. &nbsp;In most cases, they are part of the same organization.<\/li><li>Black hat hackers \u2013 they hack to take control over the system for personal gains. &nbsp;They can impair, strip or even impede authorized users from entering the system. &nbsp;They do this by discovering ambiguities and flaws in the system. &nbsp;They are sometimes called crackers.<\/li><li>Grey hat hackers \u2013 they comprise of curious people who have just about enough computer language skills to allow them to hack a system to locate potential loopholes in the network security system.<\/li><\/ul>\n\n\n\n<p>Grey hats differ from black hats in the sense that grey hats inform the admin of the network system about the weaknesses discovered in the system, while black hats are only looking for personal gains.<\/p>\n\n\n\n<p>All kinds of hacking are considered illegal except for the work done by white hat hackers.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/teachcomputerscience.com\/wp-content\/uploads\/2019\/08\/070-virus.png\" alt=\"Hacking and malware are two kinds of attempts to abuse a computer system or user.\" class=\"wp-image-5762\" width=\"279\" height=\"279\" title=\"\" srcset=\"https:\/\/teachcomputerscience.com\/wp-content\/uploads\/2019\/08\/070-virus.png 512w, https:\/\/teachcomputerscience.com\/wp-content\/uploads\/2019\/08\/070-virus-150x150.png 150w, https:\/\/teachcomputerscience.com\/wp-content\/uploads\/2019\/08\/070-virus-300x300.png 300w\" sizes=\"auto, (max-width: 279px) 100vw, 279px\" \/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Malware<\/h2>\n\n\n\n<p>Malware, short for malicious software, is any program or file that is detrimental to a computer user. &nbsp;They can perform a variety of functions, including stealing, encrypting or deleting sensitive data, altering or hijacking core computing functions and monitoring users&#8217; computer activity without their permission.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Types of Malware<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Virus \u2013 the most common type of malware. &nbsp;It can run by itself and spreads by infecting other programs or files.<\/li><li>Worm \u2013 can self-replicate without a host program. &nbsp;It spreads without any human interaction or directives from the malware authors.<\/li><li>Trojan horse \u2013 is designed to appear as a legitimate program. &nbsp;It executes its malicious functions upon activation after installation.<\/li><li>Spyware \u2013 is designed to collect information and data on users and observe their activity without users&#8217; knowledge.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Types of Malware that have Specific Purpose<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Ransomware \u2013 is designed to infect a user&#8217;s system and encrypt the data. &nbsp;Cybercriminals then demand a ransom payment from the victim in exchange for decrypting the system&#8217;s data.<\/li><li>Rootkit \u2013 is designed to obtain administrator-level access to the victim&#8217;s system. &nbsp;Once installed, the program grants threat actors privileged access to the system.<\/li><li>Remote Access Trojan&nbsp;(RAT) \u2013 is a malicious program that secretly creates a&nbsp;way&nbsp;into an infected system that authorizes threat actors to remote access it without notifying the user or the system&#8217;s security programs.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">How Malware Works<\/h3>\n\n\n\n<p>Malware can be spread in different ways in order to infect devices and networks.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Malicious programs can be transported physically to a system through a USB drive or other means.<\/li><li>Malware can be distributed in the internet where it is automatically downloaded without user\u2019s approval or knowledge. &nbsp;This is initiated when a user visits a malicious website.<\/li><li>Phishing&nbsp;attack is another type of malware delivery where an email is masked as a legitimate message which contains malicious link or attachment that is used to deliver the malware.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Similar Programs<\/h2>\n\n\n\n<p>There are other types of programs that are similar to malware but are distinctly different.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Adware can have unfavorable effects on users because of annoying ads and downgrading performance of the device or system. &nbsp;However, adware is not the same as malware, since there isn&#8217;t a malicious purpose to harm users or their systems.<\/li><\/ul>\n\n\n\n<p>However, there are instances where adware has harmful threats. &nbsp;Some adware has spyware-like features that collect information without users&#8217; knowledge or consent.<\/p>\n\n\n\n<h3 class=\"gb-headline gb-headline-67452ce3 gb-headline-text\">Further Readings:<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Hacking\" target=\"_blank\" rel=\"noopener\">Hacking<\/a><\/li><li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Malware\" target=\"_blank\" rel=\"noopener\">Malware<\/a><\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Understanding Hacking and Malware: Hacking Hacking is an endeavor to abuse a computer system or a private network in a computer. \u00a0It is illegal to access or to take control over computer network security systems for some dishonest purpose. Hackers Hackers are intelligent people and highly skilled in computers. &nbsp;It requires more intelligence and expertise &#8230; <\/p>\n<p class=\"read-more-container\"><a title=\"Hacking and Malware\" class=\"read-more button\" href=\"https:\/\/teachcomputerscience.com\/hacking-and-malware\/\" aria-label=\"More on Hacking and Malware\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_generate-full-width-content":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[25],"tags":[204,47],"class_list":["post-501","post","type-post","status-publish","format-standard","hentry","category-ethics","tag-article","tag-hide-old-upsell","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-50"],"acf":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/posts\/501","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/comments?post=501"}],"version-history":[{"count":3,"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/posts\/501\/revisions"}],"predecessor-version":[{"id":607065,"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/posts\/501\/revisions\/607065"}],"wp:attachment":[{"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/media?parent=501"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/categories?post=501"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/tags?post=501"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}