Malware - Categories

Drag answers into the correct category. Once all of the answers have been categorised press submit to check your answers.

Viruses
Worms
Trojans
Ransomware
Keyloggers

Answers
Payments are often demanded in cryptocurrency for anonymity
Operates covertly in the background, often undetected by the user
Similar to viruses, but can self-replicate without human interaction
Spreads rapidly, often exploiting network vulnerabilities
Disguises itself as legitimate software to trick users into downloading and executing it
Encrypts files on a computer or network, demanding payment for access to locked files
Often used to gain unauthorized access to systems
Malware that attaches itself to other files and spreads when these files are copied or activated
Requires human interaction to spread, such as through email attachments or file transfers
Secretly records keystrokes to capture sensitive information like passwords
Log in or sign-up to access the categorising activity



Don't have a login?

You can still revise this topic