It is a harmful program that resides in the active memory of the computer and duplicates itself.

Try the new Google Books

Check out the new look and enjoy easier access to your favorite features

It is a harmful program that resides in the active memory of the computer and duplicates itself.

A computer virus attaches itself to a program or file so it can spread from one computer to another, leaving infections as it travels. Much like human viruses, computer viruses can range in severity: Some viruses cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going. People continue the spread of a computer virus, mostly unknowingly, by sharing infecting files or sending e-mails with viruses as attachments in the e-mail.

A worm is similar to a virus by its design, and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any help from a person. A worm takes advantage of file or information transport features on your system, which allows it to travel unaided. The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line. Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding. In more recent worm attacks such as the much-talked-about .Blaster Worm., the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely.

A Trojan horse is not a virus. It is a destructive program that looks as a genuine application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. Trojans also open a backdoor entry to your computer which gives malicious users/programs access to your system, allowing confidential and personal information to be theft.

Definition: A computer worm is a malicious, self-replicating software program (popularly termed as 'malware') which affects the functions of software and hardware programs.

Description: It fits the description of a computer virus in many ways. For example, it can also self-replicate itself and spread across networks. That is why worms are often referred to as viruses also. But computer worms are different from computer viruses in certain aspects. First, unlike viruses which need to cling on to files (host files) before they can diffuse themselves inside a computer, worms exist as separate entities or standalone software. They do not need host files or programs. Secondly, unlike viruses, worms do not alter files but reside in active memory and duplicate themselves. Worms use parts of the operating system that are automatic and usually invisible to the user. Their existence in the system becomes apparent only when their uncontrolled replication consumes system resources, slowing or halting other tasks in the process. In order to spread, worms either exploit the vulnerability of the target system or use some kind of social engineering method to trick users into executing them. Once they enter a system, they take advantage of file-transport or information-transport features in the system that allows them to travel unaided. A computer worm called 'Stuxnet worm’ turned heads the world over recently when it attacked the nuclear facilities of Iran. This worm reportedly destroyed roughly a fifth of Iran's nuclear centrifuges by causing them to spin out of control by increasing the pressure on the spinning centrifuges, while displaying that everything was under control. It managed this feat by replaying the plant's protection system values in the control room while the attack was happening.

Cards Return to Set Details

Term
Definition
An attack on an ifnroation system that teks adcantage of a particular system vulnerability.
Term
Definition
An attackthat takes place before the security community or software developers knows about the culnerabukuty or has been able to repair it.
Term
Definition
A piece of programming code, usually disguised as something else that causes a computer to behace in an unexpected and usually undesirable manner.
Term
Definition
A harmful program that resides in the active memory of the computer and duplicates itself.
Term
Definition
A program in which malicious code is hidden inside a seemingly harless program.
Term
Definition
A type of Trojan horse that executes when it is triggered by a specific event.
Term
Definition
A large group of computer controlled centrally from one or more remote locations by hackers, without the knowledge or consent of their owners.
Term
Distributed Denial of Service Attact (DDoS)
Definition
An attack in which a malicious hacker takes over computers on the internet and causes them to flood a target site with demands for data and other small tasks
Term
Definition
A set of programs that enable its user to gain administrator level access to a computer without the end user's consent or knowledge.
Term
Definition
The abuse of e-mail systems to send unsolicited e-mail to large numbers of people.
Term
Completely Automated Public Turing Test to Tell Computer and Humans Apart (CAPTCHA)
Definition
Software that generates and greades tests that humans can pass but all but the most sophisticated computer programs cannot.
Term
Definition
The act of using e-mail fraudulently to try to get the recipient to reveal personal data
Term
Definition
A cariation of phishing in which the phisher send fraudulent e-mails to a certain organization's employees. The phony e-mails are designed to look like they come from high level executives withing the organization.
Term
Definition
Someone who tests the limitations of information systems out of intellectual curiosity to see if he or she can gain access.
Term
Definition
A technically inept hacker.
Term
Definition
A technically inept hacker.
Term
Definition
Someone who breaksinto other people's networks and systems to cause harm.
Term
Definition
Cooperation between two or more people often an employee and a company outsider to commit fraud.
Term
Definition
Someone who uses illegal means to obtain trade secrets from competitors of their firm.
Term
Definition
Legally obtained information gathered to help a company gain an advatage over its rivals.
Term
Definition
An individual motivated by the ptential for monetary gain who hacks into corporate computers to steal often by transferring money from one account to anoter to anoter.
Term
Definition
A form of debit or credit card that contains a moemory chip that is updated with encrypted data every time the card is used.
Term
Definition
Hacking to achieve a political or social goal.
Term
Definition
An individual who lauches comuter based attacks against other computer or network in an attempt to intimidate or coerce a government in order to adcance certain political or social objectives.
Term
Definition
A method of computing that delivers secure, private, and reliable computer experiences baded on sound business practices.
Term
Definition
The process of assessing security related risks from other internal and external threats to an organization's computers and networks.
Term
Definition
A concept in computer security that recognizes that managers muse user their judgement to ensure that the cose of contorl dose not exceed the system's benefits or the risks involved.
Term
Definition
A witten statement that defines an organization's security requirements as well as the controls and sanctions needed to meet those requirements.
Term
Virtual Private Network (VPN)
Definition
A technology that uses the internet to relay communications maintaining privacy through security procedures and tunneling protocols which encrypt data at the sending end and decrypt it at the receving end.
Term
Definition
A hardware or software device that serves as a barrier between an organization's network and the internet a firewall also limits access to the company's network based on the organizations's internet usage policy.
Term
Intrusion Percention Systems (IPs)
Definition
A network security device that prevents an attack by blocking viruses, malfored packets and other threats from getting into the prtected network.
Term
Definition
Software that regularly scans a computer's memory and disk drives for viruses.
Term
Definition
A specific sequence of bytes that indicates to antivirus software that a specific virus is present.
Term
Definition
A process that evaluates whether an organization has a well considered security policy in place and if it is being followed
Term
Intrusion Detection System
Definition
Software and our hardware that monitors systems and network resouces and activities and notifies network security personnel when it identifies possible intrusions from outsed the organization or misuse from within the organization.

Supporting users have an ad free experience!

It is a harmful program that resides in the active memory of the computer and duplicates itself.

It is a harmful program that resides in the active memory of the computer and duplicates itself.

It is a harmful program that resides in the active memory of the computer and duplicates itself.