Preview

What Worms and Trojan Horses Are

Good Essays
Open Document
Open Document
1274 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
What Worms and Trojan Horses Are
Part 1: Provide a detailed description of what worms and Trojan horses are.
Viruses, worms, and Trojans are malicious programs which enter to your computer without your permission and knowing that can cause damage, information losses, and privacies leak to your computer. They can also slow down the Internet connections, and they might even use your computer to spread themselves to your friends, family, co-workers, and the rest of the internet.
A worm, like a virus is designed to copy itself from one computer to another, but it does so automatically. First, it takes control of many features on the computer that can transport files or information. A great danger that exists is that worms have the ability to replicate in great volume. For example, a worm could send out many copies of itself to everyone listed in your e-mail address book, and their computers would then do the same, which causes a domino effect of heavy network traffic that can slow down business networks and the Internet as a whole. These new worms clog networks and possibly cause a long wait for you or anyone else to view web pages on the internet. A worm generally spreads without user action and distributes complete copies of it across networks. A worm virus can consume memory or network bandwidth, which can cause a computer to crash immediately. Because worms don 't need to travel via a host program or file, they can also tunnel into your system and allow somebody else to take control of your computer remotely also knowing as hacking.
Trojan horses are computer programs that appear to be useful software, but instead they tend to compromise your security and cause a lot of damage internally. A Trojan horse is a malicious program that is disguised as a normal application. Trojan horse programs do not replicate like a how virus does, but they can be propagated as attachments to a virus. Trojan horses cause damage or compromise the security of the computer. Trojan horses spread when people assume



References: Beal V., (June. 2010). The Difference between a Computer Virus, Worm and Trojan Horse, Retrieved from http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp Hopler W., (Sept. 2010). Reaping What You Sow: Christian Karma? Retrieved from http://www.crosswalk.com/faith/spiritual-life/reaping-what-you-sow-christian-karma-11637464.html Quinn, Michael J. (2011). Ethics for the Information Age - 4th Ed, Addison-Wesley Pearson Publications Education, Inc.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    14) What term describes a malicious software program that users are tricked into running? A) Trojan horse…

    • 284 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Malware - Can take many forms, but as the name implies, it is malicious software. It can take the form of viruses, bots, spyware, worms, trojans, rootkits, and any other software intended to cause harm. Having proper firewall and security software protection can usually prevent malware from spreading.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Malicious software, referred to as malware, can contain a variety of threats, from data loss to system failures. There are several types of worms, viruses, Trojan horses and spyware, which can be delivered in a variety of ways. Computer viruses are a type of software or executable file that attaches itself to other programs to be uses. Viruses can cause system failures, rewrite hard drives, or destroy files and programs. Worms are similar to viruses, but are independent programs, rather that attaching to others. Viruses have a tendency to spread more rapidly over networks and through e-mail. Trojan horses are based off their namesake, in which they appear to benign types of programs, but when executed can introduce malware into your system. Spyware is programing that can track computer use. Forms of…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 1

    • 345 Words
    • 2 Pages

    And once malwares, Trojans, viruses gain entry into the computer system then these software programs destabilize the operating system, cause damage to it. It is recommended to install and use effective PWS: Win32/QQpass.GR removal software like VSKsoft antivirus software to get rid of all malware related issues.…

    • 345 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Trojan horse – A type of malware that cannot self-replicate, and appears to do one action, but instead infects the computer with malicious payloads.…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 2

    • 639 Words
    • 2 Pages

    1. What are the various types of malware? How do worms differ from viruses? Do Trojan…

    • 639 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    There are cybercriminals who commit crimes using the computers and networks. They spread malicious viruses through the networks such as worms and Trojan horses. They hack other people's computers to steal important data and identity or destroy data. A hacker uses a packet sniffer to intercept the unencrypted network traffic and capture the passwords or other important information which was communicated through the network. Botnet or a Zombie computer is a computer which a hacker uses to spread viruses and to commit cybercrimes while the owner of the computer is unaware of it.…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Good Essays

    * This is a program which appears to be useful, what you cannot see is that the program opens your computer to users on the internet to be used maliciously. Most of the time Trojan viruses are used to turn your computer into a bot to maliciously attack more computers on the internet or in your network by spreading the same file.…

    • 669 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Malware Lifecycle

    • 463 Words
    • 2 Pages

    Next we will discuss malware what it is and how it affects us. Malware is any kind of unwanted software that is installed without your adequate consent. Viruses, worms, and Trojan horses are examples of malicious software that are often grouped together and referred to as malware. Cybercriminals sometimes try to trick you into downloading rogue (fake) security software that claims to protect you against malware. This rogue security software might ask you to pay for a fake product, install malware on your computer, or steal your personal information. To protect yourself from Malware it is important to do some of the following: make sure automatic updating is turned on to get all the latest security updates. Keep your firewall turned on. Don't open spam email messages or click links on suspicious…

    • 463 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Love Bug Essay

    • 438 Words
    • 2 Pages

    A virus consists of self-propagating program code that’s triggered by a specified time or event. When the program or operating system that contains the virus is used, the virus attaches itself to other files and that’s why it’s a never ending cycle. A worm travels from computer to computer in a network that doesn’t generally erase data. A worm is an independent program that can spread itself without having to be attached to a host program unlike a work which needs a host to continue its cycle. A worm may corrupt data but usually replicates itself into a full blown version that eats up the computers resources ultimately bring the computer or network to a halt. Viruses and worms are the 2 top security threats as they are the most common and effective at getting there desired results.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Just like in the human body, a virus can spread throughout a person’s computer, sometimes without a fighting chance, and become contagious to any other computers on the network or to others via email. There are three main types of “destructive” or “annoying” categories that can be downloaded via the internet or an email. They are Trojan horses, worms, and viruses. “In many cases, e-mail viruses are not "true" viruses because they cannot replicate without human interaction” (How Stuff Works). Trojan horses can simply hide the destructive application in a “package” that must be opened. Usually the package will come in the form of an attached, misleading application that the attacker will prompt the user to open. Once opened, this trojan can be so dangerous as to find the other contacts in your address book and send…

    • 2028 Words
    • 9 Pages
    Better Essays
  • Good Essays

    Trojan horse is a legitimate program that has been altered by the placement of unauthorized instructions within it. These instructions perform functions unknown to (and probably unwanted by) the user. They are not virus and do not replicate like virus. They are complete application, are not attached themselves. This is the main idea and function of the Trojan horse program.…

    • 1243 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Worms and Trojan Horses

    • 985 Words
    • 4 Pages

    Trojan horses are programs known to have benign capabilities. It neither replicates nor copies itself, but can cause damage and or compromise the security system of a computer. Trojan horses are usually sent by individuals in the forms of email. Like the worm it is usually in the form of a joke or a software program. Some tasks that are performed by Trojan worms includes opening an internet connection that allows an outsider to gain access to information and files on the user’s computer without the user’s knowledge. Looking for passwords or confidential information stored on the computer and emailing them o the attackers address.…

    • 985 Words
    • 4 Pages
    Good Essays
  • Good Essays

    ■ Let other users hijack your computer. Some viruses place“backdoor Trojans” on the computer, allowing the virus writer to connect to your computer and use it for their own purposes.…

    • 563 Words
    • 3 Pages
    Good Essays