SlideShare a Scribd company logo
1 of 3
Download to read offline
COMPUTER VIRUSES AND WORMS
#1 VIRUS
Computer viruses are small software programs that are designed to spread from one computer to
another and to interfere with computer operation.
 A computer virus might corrupt or delete data on your computer, use your email program to
spread itself to other computers, or even erase everything on your hard disk.
 Computer viruses are often spread by attachments in email messages or instant messaging
messages. That is why it is essential that you never open email attachments unless you know
who it's from and you are expecting it.
 Viruses can be disguised as attachments of funny images, greeting cards, or audio and video
files.
 Computer viruses also spread through downloads on the Internet. They can be hidden in
illicit software or other files or programs you might download.
Typical things that some current Personal Computer (PC) viruses do:
 Display a message
 Erase files
 Scramble data on a hard disk
 Cause erratic screen behavior
 Halt the PC
 Many viruses do nothing obvious at all except
spread!
Types:
1. Executable Viruses
 Traditional viruses
 Pieces of code attached to a legitimate program
 Run when the legitimate program gets executed
 Loads itself into memory and looks around to see if it can find any other programs
on the disk
2. Boot Sector Viruses
 Traditional Virus
 Infect the boot sector on floppy disks and hard disks
 By putting its code in the boot sector, a virus can guarantee it gets executed
 Load itself into memory immediately, and it is able to run whenever the computer is
on
MELISSA VIRUS:
 March 1999
 The Melissa virus was the fastest-spreading virus ever seen
 Someone created the virus as a Word document uploaded to an Internet news group
 People who downloaded the document and opened it would trigger the virus
 The virus would then send the document in an e-mail message to the first 50 people in
the person's address book
 Took advantage of the programming language built into Microsoft Word called VBA
(Visual Basic for Applications)
 The Melissa virus is a macro virus that was spread through email attachments in 1999.
 The Melissa virus may also be known as Melissa, Simpsons, Kwyjibo or Kwejeebo.
PREVENTION:
 Updates
o Windows has a feature called Critical Updates
o An entire branch of Microsoft dedicated to staying one step ahead of the
hackers
o When a possible security loophole is fixed, you need to download the patch right
away
 Anti-Viruses
 More secure operating systems
o e.g. UNIX
 Here are some actions you can take:
o Install an antivirus program.
o Don't open email attachments unless you're expecting them.
o Keep your computer updated.
o Use a firewall. Windows Firewall (or any other firewall) can help alert you to
suspicious activity if a virus or worm attempts to connect to your computer
TROJAN VIRUS
Trojans are malicious programs that perform actions that have not been authorized by the
user. These actions can include:
 Deleting data
 Blocking data
 Modifying data
 Copying data
 Disrupting the performance of computers
or computer networks
 Unlike computer viruses and worms, Trojans are not able to self-replicate
 How Trojans can impact you:
BACKDOOR: A backdoor Trojan gives malicious users remote control over the infected
computer. They enable the author to do anything they wish on the infected computer –
including sending, receiving, launching and deleting files, displaying data and rebooting
the computer. Backdoor Trojans are often used to unite a group of victim computers to
form a botnet or zombie network that can be used for criminal purposes.
EXPLOIT: Exploits are programs that contain data or code that takes advantage of a
vulnerability within application software that’s running on your computer
 A very important distinction from true viruses is that they do not replicate
themselves, as viruses do. Trojans contain malicious code, that, when triggered,
cause loss, or even theft, of data. In order for a Trojan horse to spread, you must, in
effect, invite these programs onto your computers--for example, by opening an email
attachment.
#2 WORMS
Worm - is a self-replicating program, similar to a computer virus. A virus attaches itself to, and
becomes part of, another executable program; however, a worm is self-contained and does not
need to be part of another program to propagate itself.
WORMS – is a small piece of software that uses computer networks and security holes to replicate
itself. A copy of the worm scans the network for another machine that has a specific security hole. It
copies itself to the new machine using the security hole, and then starts replicating from there, as
well.
They are often designed to exploit the file transmission capabilities found on many computers.
MORRIS WORM: The first worm to attract wide attention, the Morris worm, was written by Robert
Tappan Morris, who at the time was a graduate student at Cornell University.
It was released on November 2, 1988. The level of replication created system loads that not only
brought it to the attention of system administrators, but also disrupted the target computers. It was
guessed that the cost in "potential loss in productivity" caused by the worm and efforts to remove it
ranged at each system from $200 to more than $53,000
Morris himself was convicted under the US Computer Crime and Abuse Act and received three years’
probation, community service and a fine in excess of $10,000.
ROBERT TAPPAN MORRIS IS NOW A PROFESSOR AT MIT

More Related Content

Similar to Computer Viruses and Worms Explained

Similar to Computer Viruses and Worms Explained (20)

Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Virus
VirusVirus
Virus
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 
Viruses
VirusesViruses
Viruses
 
computer virus presentation
computer virus presentationcomputer virus presentation
computer virus presentation
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Computervirus
Computervirus Computervirus
Computervirus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
 
Computer virus
Computer virusComputer virus
Computer virus
 

More from Mahmud Hasan Tanvir

More from Mahmud Hasan Tanvir (16)

DATABASE MANAGEMENT SYSTEM
DATABASE MANAGEMENT SYSTEMDATABASE MANAGEMENT SYSTEM
DATABASE MANAGEMENT SYSTEM
 
ANALOG-TO-DIGITAL CONVERSION
ANALOG-TO-DIGITAL CONVERSIONANALOG-TO-DIGITAL CONVERSION
ANALOG-TO-DIGITAL CONVERSION
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Computer Fundamental
Computer FundamentalComputer Fundamental
Computer Fundamental
 
Chemistry Fundamentals
Chemistry FundamentalsChemistry Fundamentals
Chemistry Fundamentals
 
C++ QNA
C++ QNAC++ QNA
C++ QNA
 
Attributes in Entity-Relationship Model
Attributes in Entity-Relationship ModelAttributes in Entity-Relationship Model
Attributes in Entity-Relationship Model
 
Applications of Radioisotopes.pdf
Applications of Radioisotopes.pdfApplications of Radioisotopes.pdf
Applications of Radioisotopes.pdf
 
Arithmetic Expression
Arithmetic ExpressionArithmetic Expression
Arithmetic Expression
 
FOUR DIFFERENT TYPES OF WRITING STYLES
FOUR DIFFERENT TYPES OF WRITING STYLESFOUR DIFFERENT TYPES OF WRITING STYLES
FOUR DIFFERENT TYPES OF WRITING STYLES
 
Fable.docx
Fable.docxFable.docx
Fable.docx
 
Basic C Programming Lab Practice
Basic C Programming Lab PracticeBasic C Programming Lab Practice
Basic C Programming Lab Practice
 
Rape in Rural Bangladesh.pdf
Rape in Rural Bangladesh.pdfRape in Rural Bangladesh.pdf
Rape in Rural Bangladesh.pdf
 
First Law Of Thermodynamics.pdf
First Law Of Thermodynamics.pdfFirst Law Of Thermodynamics.pdf
First Law Of Thermodynamics.pdf
 
Difference between a variable and a constant.pdf
Difference between a variable and a constant.pdfDifference between a variable and a constant.pdf
Difference between a variable and a constant.pdf
 
Defects In Image Formation By Lenses.pdf
Defects In Image Formation By Lenses.pdfDefects In Image Formation By Lenses.pdf
Defects In Image Formation By Lenses.pdf
 

Recently uploaded

Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 

Computer Viruses and Worms Explained

  • 1. COMPUTER VIRUSES AND WORMS #1 VIRUS Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.  A computer virus might corrupt or delete data on your computer, use your email program to spread itself to other computers, or even erase everything on your hard disk.  Computer viruses are often spread by attachments in email messages or instant messaging messages. That is why it is essential that you never open email attachments unless you know who it's from and you are expecting it.  Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files.  Computer viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download. Typical things that some current Personal Computer (PC) viruses do:  Display a message  Erase files  Scramble data on a hard disk  Cause erratic screen behavior  Halt the PC  Many viruses do nothing obvious at all except spread! Types: 1. Executable Viruses  Traditional viruses  Pieces of code attached to a legitimate program  Run when the legitimate program gets executed  Loads itself into memory and looks around to see if it can find any other programs on the disk 2. Boot Sector Viruses  Traditional Virus  Infect the boot sector on floppy disks and hard disks  By putting its code in the boot sector, a virus can guarantee it gets executed  Load itself into memory immediately, and it is able to run whenever the computer is on
  • 2. MELISSA VIRUS:  March 1999  The Melissa virus was the fastest-spreading virus ever seen  Someone created the virus as a Word document uploaded to an Internet news group  People who downloaded the document and opened it would trigger the virus  The virus would then send the document in an e-mail message to the first 50 people in the person's address book  Took advantage of the programming language built into Microsoft Word called VBA (Visual Basic for Applications)  The Melissa virus is a macro virus that was spread through email attachments in 1999.  The Melissa virus may also be known as Melissa, Simpsons, Kwyjibo or Kwejeebo. PREVENTION:  Updates o Windows has a feature called Critical Updates o An entire branch of Microsoft dedicated to staying one step ahead of the hackers o When a possible security loophole is fixed, you need to download the patch right away  Anti-Viruses  More secure operating systems o e.g. UNIX  Here are some actions you can take: o Install an antivirus program. o Don't open email attachments unless you're expecting them. o Keep your computer updated. o Use a firewall. Windows Firewall (or any other firewall) can help alert you to suspicious activity if a virus or worm attempts to connect to your computer TROJAN VIRUS Trojans are malicious programs that perform actions that have not been authorized by the user. These actions can include:  Deleting data  Blocking data  Modifying data  Copying data  Disrupting the performance of computers or computer networks  Unlike computer viruses and worms, Trojans are not able to self-replicate  How Trojans can impact you: BACKDOOR: A backdoor Trojan gives malicious users remote control over the infected computer. They enable the author to do anything they wish on the infected computer – including sending, receiving, launching and deleting files, displaying data and rebooting
  • 3. the computer. Backdoor Trojans are often used to unite a group of victim computers to form a botnet or zombie network that can be used for criminal purposes. EXPLOIT: Exploits are programs that contain data or code that takes advantage of a vulnerability within application software that’s running on your computer  A very important distinction from true viruses is that they do not replicate themselves, as viruses do. Trojans contain malicious code, that, when triggered, cause loss, or even theft, of data. In order for a Trojan horse to spread, you must, in effect, invite these programs onto your computers--for example, by opening an email attachment. #2 WORMS Worm - is a self-replicating program, similar to a computer virus. A virus attaches itself to, and becomes part of, another executable program; however, a worm is self-contained and does not need to be part of another program to propagate itself. WORMS – is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well. They are often designed to exploit the file transmission capabilities found on many computers. MORRIS WORM: The first worm to attract wide attention, the Morris worm, was written by Robert Tappan Morris, who at the time was a graduate student at Cornell University. It was released on November 2, 1988. The level of replication created system loads that not only brought it to the attention of system administrators, but also disrupted the target computers. It was guessed that the cost in "potential loss in productivity" caused by the worm and efforts to remove it ranged at each system from $200 to more than $53,000 Morris himself was convicted under the US Computer Crime and Abuse Act and received three years’ probation, community service and a fine in excess of $10,000. ROBERT TAPPAN MORRIS IS NOW A PROFESSOR AT MIT