Malware Basics
Viruses & Worms
Sneaky Attacks
Ransom & Phishing
Staying Safe
100

This term describes any malicious software designed to damage or gain unauthorized access.

Malware 

100

This type of malware attaches itself to legitimate files.

Virus

100

This type of malware pretends to be a legitimate program.

Trojan horse

100

This malware locks files and demands payment.

Ransomware 

100

This type of software helps protect against malware.

Antivirus software

200

Malware can infect not just computers, but also these handheld devices.

Smartphones 

200

When this happens, a virus begins spreading after an infected file is opened.

Activation

200

Trojans secretly open this hidden entry point into a system.

Backdoor

200

Ransomware does this to victim's files.

Encrypting

200

Keeping this up to date helps protect your system.

Operating system 

300

One goal of malware is to steal this from users.

Information or data

300

Unlike viruses, these don't need human interaction to spread.

Worms

300

A Trojan might disguise itself as this kind of harmless software.

Game or useful tool

300

Victims must pay to regain this.

Access

300

These should be strong to prevent unauthorized access.

Passwords 

400

Malware can target individuals as well as these large-scale systems.

Corporate networks 

400

Worms spread quickly through these connected systems.

Networks

400

Hackers use this method to trick users into installing malware.

Deception (or pretending to be legitimate software)

400

This attack involves fake emails from trusted organizations.

Phishing 

400

Users should avoid clicking these if they seem suspicious.

Links

500

This phrase describes what malware tries to gain when breaking into systems.

Unauthorized access 

500

Some viruses do this to important data instead of just slowing computers.

Corrupting (deleting) data

500

This is the main goal of a Trojan after installation.

Giving hackers access to the system

500

Clicking these in phishing emails can install malware.

Malicious links or attachments 

500

This field focuses on protecting systems from cyber threats.

Cybersecurity 

M
e
n
u