Featured Pathways

More pathways

Banking Essentials - Part I

This pathway will walk us through the basics of banks, starting with some of the different types and their main functions, then starting to look at the regulation faced by the banks, both before and after the Global Financial Crisis.

Greenwashing

Greenwashing is the act of distributing false information about something being more environmentally friendly than it actually is.

More pathways

Book a demo

Ready to get started?

Our Platform

Expert led content

+1,000 expert presented, on-demand video modules

Learning analytics

Keep track of learning progress with our comprehensive data

Interactive learning

Engage with our video hotspots and knowledge check-ins

Testing & certification

Gain CPD / CPE credits and professional certification

Managed learning

Build, scale and manage your organisation’s learning

Integrations

Connect Finance Unlocked to your current platform

Featured Content

More featured content

Tackling the Cost of Living Crisis

In this video, Max discusses the cost-of-living crisis currently enveloping the UK. He examines its impact on households as well as the overall economy.

CSR and Sustainability in Financial Services

In the first video of this two-part video series, Elisa introduces us to sustainability. She begins by looking at the difference between sustainability and corporate social responsibility, two terms that can be easily confused.

More featured content

Book a demo

Ready to get started?

Featured Pathways

More pathways

Banking Essentials - Part I

This pathway will walk us through the basics of banks, starting with some of the different types and their main functions, then starting to look at the regulation faced by the banks, both before and after the Global Financial Crisis.

Greenwashing

Greenwashing is the act of distributing false information about something being more environmentally friendly than it actually is.

More pathways

Book a demo

Ready to get started?

Our Platform

Expert led content

+1,000 expert presented, on-demand video modules

Learning analytics

Keep track of learning progress with our comprehensive data

Interactive learning

Engage with our video hotspots and knowledge check-ins

Testing & certification

Gain CPD / CPE credits and professional certification

Managed learning

Build, scale and manage your organisation’s learning

Integrations

Connect Finance Unlocked to your current platform

Featured Content

More featured content

Tackling the Cost of Living Crisis

In this video, Max discusses the cost-of-living crisis currently enveloping the UK. He examines its impact on households as well as the overall economy.

CSR and Sustainability in Financial Services

In the first video of this two-part video series, Elisa introduces us to sustainability. She begins by looking at the difference between sustainability and corporate social responsibility, two terms that can be easily confused.

More featured content

Book a demo

Ready to get started?

Book a demo

Ready to get started?

Introduction to Malware

Introduction to Malware

Ciaran Rooney

20 years: technology, cybersecurity & operations

If you’re of a certain age, you might remember trying to download music from a file sharing service - and getting a computer virus instead. Malware, once a cheeky pastime for computer engineers, has become a behemoth. Instead of slowing your computer down, they’re now holding it to ransom. Join Ciarán Rooney as he explores what malware is, the specific kinds and the damage they have inflicted in the real world.

If you’re of a certain age, you might remember trying to download music from a file sharing service - and getting a computer virus instead. Malware, once a cheeky pastime for computer engineers, has become a behemoth. Instead of slowing your computer down, they’re now holding it to ransom. Join Ciarán Rooney as he explores what malware is, the specific kinds and the damage they have inflicted in the real world.

Subscribe to watch

Access this and all of the content on our platform by signing up for a 7-day free trial.

Introduction to Malware

12 mins 8 secs

Key learning objectives:

  • Define malware

  • Identify specific types of malware

  • Understand the real world damage inflicted by malware

Overview:

Malware, formed from the words 'malicious and 'software', is a broad term for any software that harms a device, server or network, or otherwise interferes with its normal functioning. Early examples of malware were harmless and not designed to inflict damage. However, this soon changed. We now have various types of malware including: worms, viruses, ransomware, spyware, wipers and bots.

Subscribe to watch

Access this and all of the content on our platform by signing up for a 7-day free trial.

Summary

What is malware?

Malware, formed from the words 'malicious' and 'software', is a broad term for any software that harms a device, server or network, or otherwise interferes with its normal, healthy functioning. This ecompasses any sort of damage inflicted to a computer system, as well as using the device for purposes that the user did not intend. 

What did early malware look like?

In 1971, Bob Thomas created Creeper - a program designed to move between computers and display the message “I'm the creeper: catch me if you can”. This was ultimately harmless and not designed to do damage, but rather to demonstrate an experimental self-replicating program. 

On the 2nd November 1988, college student Robert Tappan Morris created the “Morris worm”. This was one of the first computer worms - it was a program that infects computers by replicating itself across the ARPANET and the NSFNet, both precursors to the modern internet. Due to an error in his programming, the worm spread more quickly than Morris intended and ended up reinfecting the same computers over and over, slowing them down drastically. It’s estimated that six thousand computers were brought to a halt by the worm, which at the time was approximately 10% of computers connected to the network.

What types of malware are there?

Worm - Computer worms are programs that infect computers by replicating themselves before spreading to other systems via the local network, internet connection or email. It’s important to note that worms do not require any input from the user in order to take effect, which makes them especially dangerous and may explain why they are one of the key building blocks of most other types of malware.

Virus - Like a worm, a virus is a program that replicates itself, with the difference being that a virus requires the user to trigger or activate it in order for it to spread. An example would be downloading an attachment from an email that claims to be something else, something that a user would actually want to open and gain access to, as in the case of the Anna Kournikova Virus.

Ransomware - This is a form of malware that holds the user ransom by either locking them out of their device or by encrypting their data. They are then offered the chance to regain access by paying a fee. It has also been flagged as a major issue by both US President Joe Biden and Lindy Cameron, CEO of the UK National Cyber Security Centre (NCSC).

Wiper - This is a form of destructive malware that is designed to erase the data from a device. 

Spyware - As its name suggests, spyware surveils and collects information on the user for a third party. This includes anything from installing a keylogger that monitors each keystroke to tracking your internet browsing habits. 

Bots and Botnets - "Bot" derived from the word "robot", is an automated malware that interacts with other network services. Like worms, Bots are also self-propagating malware designed to infect a host. However, unlike a worm, they also connect back to a central server or servers that act as a command and control (C&C) center for an entire network of compromised devices, called a "botnet."

With a botnet, criminals can launch broad-based, "remote-control," attacks on their targets such as distributed Denial of Service Attacks (or dDOS) and relaying spam emails. Bots can also open backdoors on the infected host to log keystrokes, gather passwords, capture and analyse packets, and gather financial information.

Advanced botnets may even take advantage of common internet of things (IOT) devices such as home electronics or appliances to increase automated attacks. Crypto mining is becoming an increasingly common use of these bots.

Subscribe to watch

Access this and all of the content on our platform by signing up for a 7-day free trial.

Ciaran Rooney

Ciaran Rooney

Ciarán is the Chief Technology Officer of Finance Unlocked Ltd, the company behind the learning platforms Finance Unlocked and Sustainability Unlocked. He has over 20 years of experience in technology, cybersecurity and operations. Ciarán has held the role of CTO of several successful startups, including; busuu, one of the world's largest language learning platforms; the ad tech company Skimlinks, a content monetisation platform for some of the world's largest online publishers; and Swoon, a leading direct to consumer furniture brand. He has also been a technical consultant, a startup mentor, a conference speaker, and the Chair of the PHP UK Conference.

There are no available Videos from "Ciaran Rooney"