0
0
Intro to Computingfundamentals~10 mins

Common threats (malware, phishing, ransomware) in Intro to Computing - Flowchart & Logic Diagram

Choose your learning style9 modes available
Process Overview

This flowchart explains how common cyber threats like malware, phishing, and ransomware work step-by-step. It shows how these threats enter a computer system, what they do, and how users can respond to protect themselves.

Flowchart
Receive Email or Download File
Yes No
Click Link or Open File
Malware Infects System
Phishing Steals Info
Yes No
Encrypts Files
Demand Ransom
This flowchart shows the step-by-step process of how common threats like malware, phishing, and ransomware operate after a user receives an email or downloads a file. It includes decision points about suspicion, type of threat, and ransomware behavior.
Step-by-Step Trace - 6 Steps
Step 1: User receives an email with a link.
Step 2: User checks if the email looks suspicious.
Step 3: User clicks the link because it looks suspicious but interesting.
Step 4: System detects the threat type: phishing attempt.
Step 5: User enters information on the phishing page.
Step 6: Process ends with data stolen.
Diagram
 +-------------------+      +-------------------+      +-------------------+
 |   User's Computer | ---> |   Malware Program  | ---> |  Files Encrypted   |
 +-------------------+      +-------------------+      +-------------------+
          |                          |                          |
          v                          v                          v
 +-------------------+      +-------------------+      +-------------------+
 |  Phishing Website | ---> |  Steals Info Data |      |  Ransom Demand    |
 +-------------------+      +-------------------+      +-------------------+
This diagram shows how a user's computer interacts with malware and phishing websites. Malware can encrypt files leading to ransom demands, while phishing websites steal user information.
Flowchart Quiz - 3 Questions
Test your understanding
What should you do if you receive a suspicious email?
AAvoid clicking links or opening attachments
BClick all links to check if they are safe
CReply to the sender asking for confirmation
DForward the email to friends
Key Result
Common cyber threats start with suspicious emails or files and rely on user actions to infect systems or steal data.