Skip to content
Computing · Secondary 3 · Cybersecurity and Defense · Semester 2

Malware: Viruses, Worms, and Trojans

Students will learn about different types of malicious software, their characteristics, and how they spread.

MOE Syllabus OutcomesMOE: Cybersecurity - S3

About This Topic

Malware includes viruses, worms, and Trojans, each with distinct characteristics and propagation methods. Viruses attach to files and spread when users execute infected programs. Worms self-replicate over networks without needing a host file, exploiting vulnerabilities rapidly. Trojans disguise themselves as legitimate software to deceive users into installation. Students compare these methods, explain how malware compromises systems by stealing data, encrypting files, or granting unauthorized access, and predict consequences such as system crashes, identity theft, or financial losses.

In the Cybersecurity and Defense unit, this topic builds foundational knowledge for protecting digital assets in Singapore's connected economy. Students develop skills in threat analysis and risk assessment, essential for ethical computing practices. By examining real-world cases, they connect abstract concepts to everyday scenarios like phishing emails or rogue downloads, strengthening systems thinking and decision-making under uncertainty.

Active learning suits this topic well because simulations make invisible threats visible and engaging. When students role-play infection chains or trace mock malware paths in groups, they grasp propagation differences hands-on. Collaborative prediction exercises reveal consequences vividly, boosting retention and preparing them for defensive strategies.

Key Questions

  1. Compare the propagation methods of viruses, worms, and Trojan horses.
  2. Explain how malware can compromise a computer system.
  3. Predict the potential consequences of a malware infection.

Learning Objectives

  • Compare the propagation methods of viruses, worms, and Trojan horses, identifying key differences in their spread mechanisms.
  • Explain how malware, including viruses, worms, and Trojans, compromises computer systems by detailing specific attack vectors and impacts.
  • Analyze the potential consequences of malware infections, predicting outcomes ranging from data loss to system failure.
  • Classify different types of malware based on their behavior and infection strategies.

Before You Start

Introduction to Computer Systems

Why: Students need a basic understanding of how computer hardware and software interact to comprehend how malware can compromise a system.

File Management and Program Execution

Why: Understanding how files are stored, executed, and how programs run is essential for grasping how viruses attach to and spread through legitimate files.

Key Vocabulary

MalwareShort for malicious software, this is any software intentionally designed to cause damage to a computer, server, client, or computer network.
VirusA type of malware that attaches itself to legitimate files or programs and requires user action, such as opening an infected file, to spread.
WormA standalone malware program that replicates itself and spreads across computer networks, often exploiting security vulnerabilities without requiring user interaction.
Trojan HorseMalware disguised as legitimate or desirable software, which, when executed, allows attackers to gain unauthorized access or cause harm.
PayloadThe part of malware code that performs the malicious action, such as deleting files, stealing data, or encrypting a system.

Watch Out for These Misconceptions

Common MisconceptionAll malware spreads the same way.

What to Teach Instead

Viruses require file execution, worms exploit networks independently, and Trojans rely on social engineering. Group simulations help students map differences visually, clarifying distinctions through shared modeling and peer feedback.

Common MisconceptionAntivirus software stops every malware infection.

What to Teach Instead

No tool is foolproof; zero-day exploits evade detection. Role-playing bypass scenarios in small groups shows limitations, encouraging discussions on layered defenses like updates and caution.

Common MisconceptionWorms need user action to spread.

What to Teach Instead

Worms propagate autonomously via vulnerabilities. Network simulation activities demonstrate this independence, as students observe rapid spread without intervention, correcting the error through direct experience.

Active Learning Ideas

See all activities

Real-World Connections

  • Cybersecurity analysts at companies like Temasek Technologies use their understanding of malware propagation to design network defenses and incident response plans, protecting sensitive financial data.
  • Forensic investigators examine infected systems to trace the origin and spread of malware, similar to how law enforcement might track the spread of a biological virus to identify sources and prevent further outbreaks.
  • Software developers at Microsoft and other tech firms must implement secure coding practices to prevent vulnerabilities that worms and viruses could exploit, ensuring the integrity of operating systems and applications.

Assessment Ideas

Quick Check

Present students with three short scenarios describing how a computer became infected. Ask them to identify the type of malware (virus, worm, or Trojan) in each scenario and briefly explain their reasoning.

Discussion Prompt

Pose the question: 'If a worm can spread automatically across a network, why are viruses still a significant threat?' Facilitate a class discussion where students compare the reliance on user action for viruses versus the self-propagation of worms.

Exit Ticket

On an index card, have students write one sentence explaining how a Trojan horse deceives a user and one sentence describing a potential consequence of a computer being infected with a virus.

Frequently Asked Questions

How do viruses, worms, and Trojans differ in propagation?
Viruses spread by attaching to files executed by users. Worms self-replicate over networks without hosts. Trojans trick users into running disguised malware. Teaching with flowcharts and simulations helps students visualize and compare these paths effectively.
What active learning strategies work best for teaching malware?
Simulations of infection chains in pairs or small groups make abstract spreads concrete. Students model virus file-sharing, worm network jumps, and Trojan deceptions using props or software. Prediction debates on consequences foster critical thinking, while peer teaching reinforces distinctions and retention over lectures.
How does malware compromise computer systems?
Malware grants unauthorized access, steals data, encrypts files for ransom, or disrupts operations. Trojans often open backdoors, viruses corrupt files, and worms overload networks. Case studies with group analysis connect mechanisms to impacts, building predictive skills.
What are real-world consequences of malware infections?
Infections lead to data loss, financial theft, privacy breaches, or downtime costs. Singapore cases like ransomware on public systems highlight risks. Scenario predictions in class help students weigh personal impacts, promoting proactive habits like backups and vigilance.