Know and understand viruses and malware including how to take preventative action to avoid the danger of infecting a computer from a downloaded file
Topic 8 – Safety and Security
Objective (AO1)
Know and understand viruses, malware and other data‑threats, and be able to take appropriate preventative actions to avoid infecting a computer when downloading files.
1. Physical Safety (8.1)
Electrical safety – unplug equipment before cleaning, never touch live cables, use surge protectors.
Fire safety – keep fire‑extinguishers accessible, avoid covering vents, do not leave computers running unattended in unsafe environments.
Ergonomic safety – maintain correct posture, use adjustable chairs, take regular breaks to avoid strain.
Trip and fall hazards – keep cables organised and away from walkways, secure portable devices.
Heavy equipment – use trolleys or assistance when moving large monitors or servers.
2. What is Malware? (8.2)
Malware (malicious software) is any program deliberately created to damage, disrupt or gain unauthorised access to a computer system or the data it contains.
3. Types of Malware
Type
How it works
Typical symptoms
Computer virus
Attaches to a legitimate file or programme; spreads when the host is opened or executed.
Slow performance, unexpected pop‑ups, corrupted or missing files.
Worm
Self‑replicates across a network by exploiting vulnerabilities; does not need a host file.
Network congestion, rapid bandwidth use, many duplicate files.
Trojan horse
Disguises itself as useful software to trick the user into installing it.
Unauthorised remote access, data theft, additional malware installed.
Spyware
Collects information about the user’s activities and sends it to a third party.
Unusual ads, changed browser settings, unexpected data usage.
Ad‑ware
Displays unwanted advertisements; often bundled with free software.
Pop‑up ads, browser redirects, slower browsing.
Ransomware
Encrypts the user’s files and demands payment for the decryption key.
Files become inaccessible, ransom note appears on the screen.
4. Common Infection Vectors (How Malware Spreads)
Email attachments (especially .exe, .zip, .doc with macros)
Drive‑by downloads from compromised or fake websites
Peer‑to‑peer (P2P) file‑sharing networks
Removable media (USB sticks, external hard drives)
Instant‑messaging or social‑media links
Software updates from untrusted sources
5. How Malware Can Enter Through a Downloaded File
Locate a file on an untrusted website, P2P network, or in an unsolicited email.
Download the file without checking the source or its integrity (e.g., hash, digital signature).
Open or execute the file – hidden malicious code may run automatically.
Malware installs itself (often silently) and begins its payload (replication, data theft, encryption, etc.).
Encryption – scrambles data so it can only be read with a key (e.g., BitLocker, file‑level encryption). Why? Protects confidentiality if storage media are lost or stolen.
SSL / TLS (HTTPS) – encrypts data in transit between a browser and a web server; indicated by a padlock icon. Why? Prevents eavesdropping and man‑in‑the‑middle attacks.
Digital certificates – verify the identity of a website or software publisher. Why? Ensures the user is communicating with the genuine service.
Firewalls – hardware or software that monitors and controls network traffic. Why? Blocks unauthorised inbound connections and can restrict outbound data exfiltration.
Biometrics – fingerprint, facial recognition or iris scan used as an additional authentication factor. Why? Provides “something you are”, which is harder to steal than a password.
Two‑factor authentication (2FA) – combines something you know (password) with something you have (code, token) or something you are (biometric). Why? Even if a password is compromised, the second factor blocks access.
12. Evaluation of Protection Mechanisms (AO3 – Pros & Cons)
Mechanism
Pros
Cons / Limitations
Encryption
Data remains unreadable without the key; essential for portable devices.
Key loss = permanent data loss; can impact performance.
SSL / TLS
Protects data in transit; widely supported.
Only secures the connection, not the endpoint; expired certificates can cause trust issues.
Digital certificates
Provides authentication of websites/software.
Cost of certificates; users may ignore warning messages.
Firewalls
Effective barrier against many external attacks.
Improper configuration can block legitimate traffic; does not stop insider threats.
Biometrics
Convenient, hard to guess.
False‑reject/accept rates; privacy concerns over biometric data storage.
2FA
Greatly reduces risk of account compromise.
Requires additional device or app; can be bypassed with sophisticated phishing (e.g., real‑time code interception).
13. Legal and Ethical Aspects (8.4 – AO3)
Data‑Protection legislation – UK Data Protection Act 2018 and GDPR require organisations to protect personal data, report breaches within 72 hours, and respect the eight data‑protection principles.
Copyright law – downloading, sharing or installing software, music, films or games without the rights holder’s permission breaches copyright and may be prosecuted under the Copyright, Designs and Patents Act 1988.
Responsible use – do not create, distribute or install malware; respect others’ privacy and intellectual property.
Reporting incidents – inform a teacher, IT administrator or the designated data‑protection officer immediately if malware is detected or a breach is suspected.
14. Step‑by‑Step Checklist for Safe Downloading (AO2)
Confirm that the file is really needed.
Navigate to a trusted website – check for HTTPS and a reputable domain name.
Read user reviews or comments, if available.
Download the file to a dedicated “Downloads” folder.
Verify the file’s integrity (hash value, digital signature) where possible.
Right‑click the file and select “Scan with [antivirus]”.
If the scan is clean, open the file; if a threat is detected, quarantine or delete it and report the incident.
After use, move the file to a secure location (e.g., encrypted folder) or delete it permanently.
Update any relevant passwords if the file required authentication.
15. What to Do If Malware Is Detected (AO3 – Evaluation)
Quarantine the file using the antivirus programme.
Run a full system scan to locate additional infections.
Update antivirus definitions before rescanning.
Remove the infected file(s) if the antivirus offers a clean‑up option.
Change passwords for any accounts that may have been compromised.
Restore affected files from a recent backup if they were encrypted or corrupted.
Check for persistence mechanisms (e.g., scheduled tasks, registry entries) and delete them.
Report the incident to the school’s IT support or the appropriate authority.
Review security settings – ensure firewalls, updates and backups are active.
16. Suggested Diagram
Flowchart – Stages of a malware infection from a downloaded file
Malware includes viruses, worms, trojans, spyware, ad‑ware and ransomware; each spreads in a slightly different way.
Downloaded files are a common infection vector – always verify the source, check extensions, confirm integrity and scan before opening.
Physical safety, strong passwords, regular updates, reputable anti‑malware, firewalls, encryption, backups and sandboxing together provide layered protection.
Understanding the data‑protection principles (lawful processing, purpose limitation, data minimisation, etc.) helps you apply legal safeguards.
Legal obligations (GDPR/Data Protection Act, copyright law) and ethical behaviour (responsible use, reporting incidents) are essential components of good ICT practice.
Support e-Consult Kenya
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources,
past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.