Computer Science Illuminated
Computer Science Illuminated
7th Edition
ISBN: 9781284155617
Author: Nell Dale, John Lewis
Publisher: Jones & Bartlett Learning
Question
Book Icon
Chapter 17, Problem 41E
Program Plan Intro

Malicious code:

  • A serious damage such as destruction of data or creating a nuisance by sending unwanted messages is called as a malicious code.
  • There are many categories of malicious codes:
    • Virus: The self-replicating program which is malicious and embeds itself into another program is called as computer “virus”.
    • Trojan horse: A kind of program that is helpful in some way but creates a different kind of problem when it gets executed.
    • Worm: A standalone program that targets network resources is called as a worm. It sends copies of itself to the network by consuming the bandwidth.
    • Logic bomb: The malicious code that executes when a certain system-oriented event occurs is called as a logic bomb.

Blurred answer
Knowledge Booster
Background pattern image
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education