Malware (malicious software) is any program or code designed to damage, disrupt, or gain unauthorised access to computer systems. The Cambridge syllabus expects students to know the main types of malware, the purposes for which they are used, the consequences of infection, and the full range of software‑based, physical, and organisational controls that can prevent infection – together with the advantages, disadvantages and typical exam‑scenario use of each control.
Typical consequences of a malware infection (exam‑relevant points):
The syllabus links malware prevention to the protection of personal data. Personal data must be kept confidential, accurate, and protected against unauthorised access.
| Control | Advantages | Disadvantages | Typical exam scenario where this control is most appropriate |
|---|---|---|---|
| Antivirus / Anti‑malware software | Real‑time scanning; easy to deploy; signatures & heuristics catch known threats. | May miss zero‑day or heavily obfuscated malware; requires frequent definition updates. | General‑purpose office PCs where cost‑effective baseline protection is needed. |
| Software firewall | Filters inbound/outbound traffic; can block known malicious ports/IPs. | Mis‑configured rules can impede legitimate applications; cannot stop attacks that use allowed ports. | Workstations that need outbound Internet access but must restrict inbound connections. |
| Patch Management | Removes known vulnerabilities before they can be exploited. | Potential compatibility issues; depends on vendor release schedules. | Servers hosting critical services where unpatched OS/applications pose high risk. |
| Application Whitelisting | Only approved programs can execute – highly effective against unknown malware. | Maintenance‑intensive; risk of blocking legitimate tools. | High‑security labs or kiosks with a fixed set of required applications. |
| Secure Configuration & Least‑privilege accounts | Reduces attack surface; limits damage if a compromise occurs. | Higher administrative overhead; users may request elevated rights. | Enterprise environments where many users need only read‑only access to data. |
| Network Segmentation (VLANs, DMZs) | Contains infection to a limited zone; protects critical assets. | Complex design and ongoing management. | Organizations with distinct public‑facing services and internal finance systems. |
| Intrusion Detection / Prevention Systems (IDS/IPS) | Detects known signatures and anomalous behaviour; can block attacks in real time. | High false‑positive rates; requires skilled tuning. | Data‑centre perimeter where rapid detection of sophisticated attacks is required. |
| Encryption (full‑disk, file‑level, TLS/SSL) | Protects data at rest and in transit; limits impact of ransomware. | Does not stop infection; key management adds complexity. | Portable laptops containing personal or client data that may be lost or stolen. |
| Control | Advantages | Disadvantages | Typical exam scenario where this control is most appropriate |
|---|---|---|---|
| Hardware firewall / dedicated router | Robust perimeter barrier independent of host OS. | Costly to purchase and maintain; configuration errors can expose gaps. | Small‑to‑medium enterprises needing a clear network demarcation. |
| Secure boot & Trusted Platform Module (TPM) | Ensures only trusted firmware/OS images load; prevents low‑level rootkits. | May conflict with custom or legacy hardware/software. | Modern laptops used for handling sensitive personal data. |
| Secure boot chain verification (BIOS/UEFI password protection) | Stops unauthorised changes to firmware settings; adds a physical‑access barrier. | Forgotten passwords can lock legitimate administrators out. | Shared workstations in public libraries or schools. |
| USB / port lockdown | Stops malware spread via removable media; reduces accidental data leakage. | Inconvenient for legitimate use; requires policy enforcement. | High‑security environments where data must not leave the premises. |
| Air‑gapped systems | Complete isolation from network‑borne threats. | Limits functionality; data transfer must be tightly controlled. | Industrial control systems or classified research labs. |
| Write‑once / immutable backup media | Backups cannot be altered by ransomware; ensures a clean restore point. | Higher cost; requires regular media rotation and off‑site storage. | Critical business‑continuity servers that must survive a ransomware attack. |
| Prevention Method | Type | Key Advantages | Key Disadvantages |
|---|---|---|---|
| Antivirus / Anti‑malware | Software | Real‑time protection; easy deployment. | May miss zero‑day threats; requires updates. |
| Software firewall | Software | Filters traffic; blocks known malicious ports/IPs. | Improper rules can block legitimate traffic. |
| Patch Management | Software | Closes known vulnerabilities. | Potential compatibility issues. |
| Application Whitelisting | Software | Only trusted code runs. | Maintenance intensive. |
| Least‑privilege & Secure Config. | Software | Reduces attack surface. | Higher admin overhead. |
| Network Segmentation | Software | Contains spread of infection. | Complex design. |
| IDS/IPS | Software | Detects signatures & anomalies; can block attacks. | False positives; needs tuning. |
| Encryption (full‑disk, file‑level, TLS/SSL) | Software | Protects data even if ransomware encrypts files. | Does not prevent infection; key management. |
| Hardware firewall / router | Physical | Perimeter protection independent of host OS. | Cost and configuration complexity. |
| Secure boot & TPM | Physical | Prevents unauthorised firmware/OS loading. | May conflict with legacy systems. |
| BIOS/UEFI password protection | Physical | Stops unauthorised firmware changes. | Risk of lock‑out if password forgotten. |
| USB / port lockdown | Physical | Stops malware spread via removable media. | Inconvenient for legitimate use. |
| Air‑gapped systems | Physical | Complete isolation from network threats. | Limits functionality. |
| Write‑once / immutable backup media | Physical | Backups cannot be altered by ransomware. | Higher cost; media rotation required. |
Create an account or Login to take a Quiz
Log in to suggest improvements to this note.
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources, past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.