Post-UTME Past Questions - Original materials are available here - Download PDF for your school of choice + 1 year SMS alerts
WAEC May/June 2024 - Practice for Objective & Theory - From 1988 till date, download app now - 99995

2023 WAEC Data Processing Theory (a)(i) What is malware in computing? (ii) List three types of malware (b) State three symptoms of...

Data Processing
WAEC 2023

(a)(i) What is malware in computing?
(ii) List three types of malware
(b) State three symptoms of malware infection
(c) Give two ways of preventing malware infection

WAEC Past Questions, Objective & Theory, Study 100% offline, Download app now - 24709
WAEC offline past questions - with all answers and explanations in one app - Download for free
Post-UTME Past Questions - Original materials are available here - Download PDF for your school of choice + 1 year SMS alerts
Explanation

(a)(i) Malware, short for "malicious software," refers to any software or code specifically designed to harm, disrupt, or gain unauthorized access to computer systems, networks, or user data. Malware is created with malicious intent and can take various forms, often causing harm to computers, stealing sensitive information, or compromising system integrity. It's a broad category that encompasses a range of malicious software types, each with its own distinct behavior and purpose.
(ii) Common types of malware include viruses, worms, trojans, spyware, adware, ransomware, and more.

Here's a brief overview of some common types of malware:

- Viruses: Viruses are malicious programs that attach themselves to legitimate files or software and replicate when the infected file is executed. They can spread across systems and cause damage by corrupting or deleting files, as well as by spreading to other devices.

- Worms: Worms are self-replicating malware that spread through computer networks without requiring user interaction. They exploit vulnerabilities to automatically infect and spread to other systems, often causing network congestion and slowdowns.

- Trojans: Trojans, named after the deceptive Trojan Horse from Greek mythology, appear to be legitimate software but contain hidden malicious functions. They can create backdoors, steal information, or perform other harmful actions.

- Spyware: Spyware is designed to collect information from a user's device without their knowledge. It can track browsing habits, capture keystrokes, record personal information, and relay this data to malicious actors.

- Adware: Adware displays unwanted advertisements to users, often in the form of pop-ups or banners. While not always harmful, adware can be intrusive and negatively affect the user experience.

- Ransomware: Ransomware encrypts a user's files or entire system and demands payment (a ransom) in exchange for the decryption key. It can render data inaccessible until the ransom is paid, though there's no guarantee of receiving the decryption key even after payment.

- Botnets: Botnets are networks of compromised computers, often controlled remotely by a single entity, which can be used for various malicious activities, such as launching distributed denial-of-service (DDoS) attacks or sending spam.

- Rootkits: Rootkits are designed to gain unauthorized access to a computer system and conceal their presence from detection by modifying system components. They often grant control of the system to attackers.

- Keyloggers: Keyloggers capture keystrokes on a compromised system, potentially recording sensitive information like passwords and credit card numbers.

- Malvertising: Malvertising involves spreading malware through online advertisements. Attackers inject malicious code into legitimate ads, and when users click on these ads, they can inadvertently download and install malware.

- Fileless Malware: This type of malware doesn't rely on traditional files but resides in a system's memory or uses legitimate system tools to carry out malicious activities. This makes it harder to detect and remove.

Malware can be introduced through various means, including infected email attachments, malicious downloads, compromised websites, and social engineering tactics. Protecting against malware involves using security software, regularly updating software and operating systems, practicing safe browsing habits, being cautious with email attachments, and regularly backing up important data.

(b) - The computer starts to run slowly. Malware can slow down the computer by consuming resources, such as CPU time and memory.

- The computer crashes or freezes. Malware can cause computers to crash or freeze by overloading it or by corrupting system files.

- One sees new programs or toolbars on the computer. Malware can install new programs or toolbars on the computer without one's knowledge.

- One sees pop-up ads. Malware can display pop-up ads on the computer, even if one have ad blockers installed.

5. The homepage changes. Malware can change the homepage to a website that one did not choose.

6. The search results are different. Malware can change the search results to show websites that are not relevant to the search terms.

7. one receives emails from people one doesn't know. Malware can send emails from one's email account to people one doesn't know.

8. One sees unfamiliar transactions on the bank statement. Malware can steal banking information and make unauthorized transactions.

9. Encrypted files. Ransomware is a type of malware that encrypts files and demands a ransom payment in order to decrypt them.

(c) One can prevent malware infection by:

- Using Reliable Security Software

- Keeping Software Updated

- Exercising Caution with Email

- Staying Away from Suspicious Websites

- Using Strong and Unique Passwords

- Enabling Firewall Protection

- Being Careful with Downloads

- Regularly Backing Up Data

- Using Secure Wi-Fi Connections

- Disabling Macro Scripts: One should be cautious when enabling macros in documents, as they can be used to deliver malware. Disable macros unless one is sure the document is from a trusted source and requires macros to function properly.

- Educating oneself and Others

- Regularly Scanning for Malware

- Using Browser Security Features

- Patching Software Promptly: Apply updates and patches to software and applications as soon as they're available. Exploits often target known vulnerabilities that can be mitigated with updates.

- Disabling Unnecessary Plugins and Extensions

By implementing these preventive measures, one can significantly reduce the risk of malware infections and maintain a more secure and protected computing environment


Report an Error Ask A Question Download App
Post-UTME Past Questions - Original materials are available here - Download PDF for your school of choice + 1 year SMS alerts
WAEC May/June 2024 - Practice for Objective & Theory - From 1988 till date, download app now - 99995
WAEC Past Questions, Objective & Theory, Study 100% offline, Download app now - 24709

Contributions ({{ comment_count }})

Please wait...

{{ settings.no_comment_msg ? settings.no_comment_msg : 'There are no comments' }}

Quick Questions

Post your Contribution

Please don't post or ask to join a "Group" or "Whatsapp Group" as a comment. It will be deleted. To join or start a group, please click here

{{ quote.posted_by.display_name }}
{{ settings.form_textarea_description }}
 
WAEC May/June 2024 - Practice for Objective & Theory - From 1988 till date, download app now - 99995
Post-UTME Past Questions - Original materials are available here - Download PDF for your school of choice + 1 year SMS alerts
WAEC Past Questions, Objective & Theory, Study 100% offline, Download app now - 24709
WAEC offline past questions - with all answers and explanations in one app - Download for free
WAEC offline past questions - with all answers and explanations in one app - Download for free
Post-UTME Past Questions - Original materials are available here - Download PDF for your school of choice + 1 year SMS alerts
WAEC Past Questions, Objective & Theory, Study 100% offline, Download app now - 24709
WAEC May/June 2024 - Practice for Objective & Theory - From 1988 till date, download app now - 99995