Ict Theory Notes
Ict Theory Notes
Viruses Programs or program code that can replicate/copy itself with the intention of
deleting or corrupting
files, or cause the computer to malfunction; they need an active host program
on the target computer
or an operating system that has already been infected before they can run
Worms This is a type of stand-alone virus that can replicate itself with the intention of
spreading to others. computers; often uses networks to search out computers
with weak security which are prone to such attacks
Trojan horses These are malicious programs often disguised as legitimate software; they
replace all or part of the
legitimate software with the intent of carrying out some harm to the user’s
computer system
Spyware Software that gathers information by monitoring, for example, all the activity
on a user’s computer; the
gathered information is then sent back to the person who sent the software
(sometimes they monitor
key presses, which is referred to as key logging software)
Adware Software that floods a user’s computer with unwanted advertising; usually in
the form of pop-ups, but
can frequently appear in the browser address window redirecting the browser
to a fake website which
contains the promotional adverts
Ransomware Programs that encrypt the data on a user’s computer; a decryption key is sent
back to the user once
they pay a sum of money (a ransom); they are often sent via a Trojan horse
or by social engineering
Card fraud:
● Card fraud can happen in many ways, a few of them being;
○ Shoulder surfing
■
○ Card cloning
○ Key logging software