preview

Malicious wares Worms A computer worm is a program that self-propagates across a network

Good Essays

Malicious wares
Worms
A computer worm is a program that self-propagates across a network exploiting security or policy flaws in widely-used services. The first computer worm widely spread in 1988. Typically, worm can be divided to different class based on different factors. Such as target discovery, carrier, activation, payloads, and attackers. There are some successful multi-modal worms; however it is still based on the specific method mentioned above.
Doesn’t like other malwares, most of worms are only designed for widely spread and do not the host operating systems. However, some payload free worms may cause network traffic increasing and some other effects, such as Morris worm and Mydoom. A payload which is a piece of code to do …show more content…

Trojans and backdoors are not themselves cannot be detected easily, but if it is a significant activity in computing or communications may cause your computer to run slowly. Malicious programs are categorized as a Trojan horse, if she's not trying to inject themselves into other files (computer virus), or otherwise spread (worm). A computer may host malicious software Trojans is executing user tricks (often an email attachment disguised as aonsosbisios, for example, a routine form to be filled in), or by drive-by download. Figure 1 shows an example of a Trojan Horse found by antivirus.

Virus
A computer virus is a type of malware that during repetitions by inserting copies of itself (possibly modified) in other computer programs, files, or the boot sector of the hard disk; If the replication was successful, the affected areas are then "infected". Viruses lead to often a type of harmful activity infected hosts such as steal, disk space on the hard disk or CPU time, display uncontrollable message, steal user contacts, access to private information, corrupt user or system data or log keyboard. However, the main characteristic of viruses is self-replicating and self-installing. Only some of viruses would carry a payload or have a hidden behavior.
Virus writers often use social engineering and detailed knowledge of security vulnerabilities get access to computing resources their hosts. The vast majority

Get Access