OUTCOME: Understand the different types of malicious code and how to defend against them.
Questions:
What are three different activities that malware is used to do?
What are the most common ways malware is spread?
What file type are viruses attached to?
What is the difference between a virus and a worm?
What information do criminals use trojans to try and obtain from personal computers?
Research Task:
Research a worm, a trojan, and a virus. Make a copy of this document and fill in the information required for each.
Defence against Malicious Code Task:
Research and identify two different methods that can be used to defend your personal devices against malware.
There is space in your Google Doc from Activity 2 for your answers.