016 malware menagerie: viruses, worms, and trojans (ks3)
Step into the Malware Menagerie! Discover how viruses, worms, and trojans operate and learn how to defend against them as a Digital Protector in this interactive KS3 computing lesson.
The Malware Menagerie: Beast Tamer
In the world of cybersecurity, a Digital Protector must always be on guard against malicious software, commonly known as malware. Malware is a broad term for any code or program written specifically to harm, disrupt, or steal from a computer system. While people often call all malware "viruses," a true Digital Protector knows that there are actually several different "beasts" in the malware menagerie, each with its own unique behaviour.
Computer Virus
The first beast is the Computer Virus. Much like a biological virus needs a human host to replicate, a computer virus needs a host file or program. It attaches its malicious code to a clean file (like a Word document or an executable program). The virus remains dormant until the user actively opens the infected file. Once triggered, the virus runs, infecting other files and often damaging the system by deleting data or corrupting software.
Computer Worm
The second beast is the Computer Worm. Worms are far more independent than viruses. They do not need a host file, and they do not need a human to click on anything to activate them. Instead, worms crawl through computer networks, finding vulnerabilities (weaknesses) in security systems. Once a worm enters a computer, it immediately copies itself and sends those copies out to other connected computers, causing massive network traffic jams and spreading incredibly fast.
Trojan Horse
The third beast is the Trojan Horse. Named after the ancient Greek myth, a Trojan relies entirely on deception. It disguises itself as a desirable, legitimate piece of software - perhaps a free game, a useful tool, or a system update. The user is tricked into downloading and installing it. Once inside the defensive walls of the computer, the Trojan reveals its true nature. It doesn't usually copy itself like a virus or worm, but instead, it creates a "backdoor." This backdoor allows hackers to secretly control the computer, spy on the user, or steal passwords.
To defend against this menagerie, users must employ robust antivirus software, keep their operating systems updated to patch vulnerabilities, and exercise extreme caution when downloading files or clicking on email attachments.

The national cybersecurity grid has detected a surge in suspicious digital activity. You have been hired as a Junior Threat Analyst to identify these threats before they cause widespread chaos. You need to create a "Beast Bestiary" - a threat report that classifies three major types of malware so other agents know what they are dealing with.
The Persona
You are The Digital Protector. Your mindset is focused on defence, vigilance, and understanding the enemy. You don't just ask "What is this program doing?", you ask "How is it trying to trick us, and how can we block it?"
Your Mission Briefing
You need to create a 3-page digital threat report or presentation outlining the behaviour of the three main beasts in the MalwareAn umbrella term used to refer to a variety of hostile or intrusive software menagerie. Use the steps below to guide your investigation.
1
Identify the Beasts
Open a new presentation or word document.
Create a title page called "The Malware Menagerie: Threat Report".
Create three separate sections or slides. Name them: Computer VirusI have no idea what this means, Computer WormI have no idea what this means, and Trojan HorseI have no idea what this means.
2
Investigate Behaviour
For each malware type, you must research and answer three specific questions:
How does it spread or enter a system?
Does it need a human to click or run something to activate?
What kind of damage does it usually cause?
Use this safe search link to find reliable information: Research Malware Types.
3
Consult the AI Threat Database
If you are stuck on the difference between a Virus and a Worm, you can query our Artificial Intelligence database for a clear explanation. Click the link below:
Act as a supportive, expert computer science tutor. Explain the difference between a computer virus and a computer worm. Limit your response to 150 words. Explain this so a 13-year-old KS3 student can understand. Keep the tone encouraging, clear, and avoiding overly academic jargon. Include 1 real-world analogy. NO intro, NO outro, NO deviation from the topic, NO follow-up questions.
4
Develop Defences
A Digital Protector doesn't just identify problems; they solve them.
Add a final section to your report titled "Defensive Strategies".
List at least three actions an average user can take to prevent these "beasts" from infecting their computer (e.g., using AntivirusI have no idea what this means software, avoiding suspicious email attachments).
If you need help, use this search: Malware Protection Strategies.
Outcome
Check your final report against these criteria before submitting:
Check your final report against these criteria before submitting:
I have created a document with clear headings for Viruses, Worms, and Trojans.
I have explained how each type of malware behaves and spreads.
I have used correct terminology, such as malware, payload, and execute.
I have included a section on how to defend against these threats.
Last modified: March 5th, 2026
