Skip main navigation

£199.99 £139.99 for one year of Unlimited learning. Offer ends on 28 February 2023 at 23:59 (UTC). T&Cs apply

Find out more

Cyber threat: malware

A cyber- or cyber security threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general.
© Coventry University. CC BY-NC 4.0

A cyber threat, or cyber security threat, is a malicious act that seeks to damage data, steal data, or disrupt digital life in general.

Cyber threats are a big deal. Cyber attacks can cause electrical blackouts, failure of military equipment and breaches of national security secrets. They can result in the theft of valuable, sensitive data like medical records. They can disrupt phone and computer networks or paralyse systems.

Cyber attacks include threats like computer viruses, data breaches, and Denial of Service (DoS) attacks.

We will discuss some types of threats over the next couple of steps, beginning with malware.

Cyber threat: malware

Malware types include worms, spyware, rimeware, adware, viruses, trojans and rootkit Click image to enlarge

Malicious software, or malware, is used by cyber criminals, hacktivists and nation states to disrupt computer operations, steal personal or professional data, bypass access controls and otherwise cause harm to the host system. Appearing in the form of executable code, scripts, active content or other software variants, there are many different classes of malware which possess varying means of infecting machines and propagating themselves.

“Malware has remained at the heart of incidents affecting every sector, making up 30% of incidents reported to CERT-UK, and with the vast majority of these incidents allowing unauthorised access to a network or information held on it. Malware remains the greatest threat to cyber-security in the UK.”
(National Cyber Security Centre 2016: 2)
Malware can have a damaging impact on individuals and organisations: from causing your connection to slow down to stealing your information, crashing the system or even hijacking it.
Malware can be invisible and have no known or noticeable effects and run on your computer undetected if it’s well written. In some instances, organisations have discovered malware that was sitting on their network for a couple of years, undetected, slowly stealing information and causing extensive organisation and operational damage.

Your task

Explore the different types of malware and their impact.


National Cyber Security Centre (2016) CERT-UK Annual Report 2015/16 [online]. available from [20 August 2019]

© Coventry University. CC BY-NC 4.0
This article is from the free online

The Cyber Security Landscape

Created by
FutureLearn - Learning For Life

Our purpose is to transform access to education.

We offer a diverse selection of courses from leading universities and cultural institutions from around the world. These are delivered one step at a time, and are accessible on mobile, tablet and desktop, so you can fit learning around your life.

We believe learning should be an enjoyable, social experience, so our courses offer the opportunity to discuss what you’re learning with others as you go, helping you make fresh discoveries and form new ideas.
You can unlock new opportunities with unlimited access to hundreds of online short courses for a year by subscribing to our Unlimited package. Build your knowledge with top universities and organisations.

Learn more about how FutureLearn is transforming access to education