
All about Malwares
Presentation
•
•
Practice Problem
•
Easy
Asma Begum
Used 23+ times
FREE Resource
17 Slides • 9 Questions
1
Open Ended
How do we protect ourselves from harmful viruses /weather in our daily life?
2
Keeping digital devices safe
from malware
Introduction to Internet
Lesson 3
3
What we will learn
Objectives
• Describe the distinction between
hardware and software and
recognize potential threats to both.
• Classify various types of malware,
such as viruses, worms, trojan
horses, and spyware,
understanding their unique
characteristics and how they
operate.
• Apply best practices to prevent
malware attacks and maintain the
safety of digital devices.
Success Criteria
• I can explain the difference between
hardware and software and identify
ways to protect both from harm.
• I can name and describe the key
features of different types of malware
and their potential impact on devices.
• I can list and implement strategies to
protect my device from malware and
seek guidance when uncertain about
digital safety.
4
Staying safe in the digital world
●
We protect ourselves from danger and
harm in lots of different ways.
●
If it's freezing outside, we protect ourselves from the cold
by wearing a warm coat.
●
When crossing a busy road, we always use crossings or
look for a safe place to cross.
●
When using digital devices and computers, it's important
to know how to keep our friends, families and ourselves
safe.
5
Open Ended
What do you mean by hardware and software of a computer? can you give an example of each?
6
Hardware and software
•Hardware is the physical parts of the device, that we
can see and touch (including the inside of the
computer).
•Devices are made up of two separate
parts - hardware and software.
7
• The software is the information and programs stored
inside the computer's memory.
• We can protect the device's hardware by keeping it in a
protective case and being careful not to scratch or
damage it when we use it.
• Even if we keep the hardware safe, the
software might still be in danger.
8
Draw
Collaborate with your peers and identify the different Hardware and software parts. write H for hardware and s for software.
9
Poll
Do the devices can also be attacked by viruses?
Yes
No
10
Dangerous software programs
• There are harmful programs called malware
that can damage the software inside
a digital device.
• It does this by attacking the software that
makes your device not to work properly.
• The word malware comes from combining
the words malicious (meaning harmful)
and software (meaning program).
11
Dangerous software programs
• When a device is being attacked by
malware, we say that it is infected.
• Malware will often try to spread to other
computers and devices using the internet.
• It might become part of an email message
attachment or pretend to be a photo or
document that you are sharing.
12
Open Ended
What will happen when the device is attacked by virus?
13
Your device slows
down
Your device shuts
down and restarts b
y itself - this is
called rebooting
Your device stops
working completely -
this is called crashing
What can happen to your device?
Some signs that your device might be infected are:
• Malware is made to stop your device from running properly.
• Sometimes, it will delete all your information and programs.
• It might also try and steal your personal information and send
it back to whoever created the malware
14
JUPITER
Worms
Spyware
Viruses
Trojan horse
What different types of malware are
there?
15
Viruses
•A virus is a type of malware that spreads by attaching
itself to other programs.
•It's named after the viruses that make people ill, like
the common cold.
•Once your device has a virus it may spread quickly to
other devices, when you are connected to the
internet.
16
Viruses
•A virus can secretly attach itself to an email. This way it
can spread to your friends and family when you send
them a message.
•It can also copy itself onto a memory stick and infect
another device that way.
17
Worms
• Worms can spread from device to device.
• Unlike a virus, they don't need to attach themselves to
other programs.
• Worms can copy themselves hundreds of times, so they
can very quickly harm your device.
• A worm might copy itself onto your email account and
send a copy of itself to all of your contacts!
18
Trojan horse
●
A trojan horse (or just a trojan) pretends it
is a safe, useful computer program.
●
It will, however, try to attack your device.
●
Trojans are named after the Ancient
Greek legend of the Trojan Horse.
19
Spyware
• Spyware is malware that steals personal
information about the user like:
• usernames
• passwords
• email addresses
• It does this by keeping a record of everything the user
types, which is called key logging.
• Some spyware can even use your webcam without your
knowledge!
20
Open Ended
How can we protect our device from these malwares?
21
●Don't download any software or
apps from the web, unless you
have checked with an adult
that it's safe.
●Never click on an email
attachment, unless you know
who it is from and what they are
sending.
How to avoid viruses and malware
●If you get a strange or unusual
message from a friend, let them
know that they might be
the victim of a malware attack.
●It's wise to cover
your webcam when you are
not using it.
Here are some top tips to protect your devices from a malware attack:
22
●There is a type of program
called anti-virus software.
●It checks and scans your
device regularly for malware
and helps to remove any it
finds.
●It's a good idea to use anti-
virus software and run regular
checks on your devices.
How to avoid viruses and malware
23
if you are worried
about any type of
malware, check
with a trusted
adult
Tip
24
Multiple Choice
Which of the following is an alternative name for malware?
Computer bug
Computer hack
Malicious software
Error code
25
Multiple Select
Identify different malwares?
Worms
Trojan
Anti virus
Spyware
26
Open Ended
We can avoid viruses and malwares on our devices by having..........
How do we protect ourselves from harmful viruses /weather in our daily life?
Show answer
Auto Play
Slide 1 / 26
OPEN ENDED
Similar Resources on Wayground
20 questions
French and Indian War
Presentation
•
7th - 8th Grade
20 questions
Simple Past Tense
Presentation
•
7th Grade
20 questions
Biotechnology
Presentation
•
8th Grade
20 questions
Milestones Mixed Review 2
Presentation
•
8th Grade
20 questions
Newton's Laws Extended Day
Presentation
•
8th Grade
20 questions
Prefixes and Suffixes
Presentation
•
2nd Grade
20 questions
Properties of Matter
Presentation
•
9th Grade
20 questions
VS 3abc Mini Quiz
Presentation
•
4th Grade
Popular Resources on Wayground
20 questions
"What is the question asking??" Grades 3-5
Quiz
•
1st - 5th Grade
20 questions
“What is the question asking??” Grades 6-8
Quiz
•
6th - 8th Grade
10 questions
Fire Safety Quiz
Quiz
•
12th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
34 questions
STAAR Review 6th - 8th grade Reading Part 1
Quiz
•
6th - 8th Grade
20 questions
“What is the question asking??” English I-II
Quiz
•
9th - 12th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
47 questions
8th Grade Reading STAAR Ultimate Review!
Quiz
•
8th Grade
Discover more resources for
20 questions
"What is the question asking??" Grades 3-5
Quiz
•
1st - 5th Grade
20 questions
“What is the question asking??” Grades 6-8
Quiz
•
6th - 8th Grade
10 questions
Fire Safety Quiz
Quiz
•
12th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
34 questions
STAAR Review 6th - 8th grade Reading Part 1
Quiz
•
6th - 8th Grade
20 questions
“What is the question asking??” English I-II
Quiz
•
9th - 12th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
47 questions
8th Grade Reading STAAR Ultimate Review!
Quiz
•
8th Grade