Viruses, Worms, and Trojan Horses

Posted on August 9, 2009. Filed under: CCNA, ICND1 break down | Tags: , , , |

Viruses, Worms, and Trojan Horses are all malicious computer programs that threat your data security and integrity. 

What are they and what are the differences between Viruses, Worms, and Trojan Horses?

  • Viruses — A computer virus is a small program written to alter the way a computer operates, without the permission or knowledge of the user. It have to execute itself and replicate itself.A virus’s duplicate requires the spreading of an infected host file.
  • Worm — Worms are programs that replicate themselves from system to system without the use of a host file. First it takes control of features on the computer that can transport files or information. Once a worm is in your system, it can travel alone automatically.
  • Trojan horse — Trojan horses are files that claim to be something desirable but, in fact, are malicious.  A very important distinction between Trojan horse programs and true viruses is that they do not replicate themselves. For a Trojan horse to spread, you must invite these programs onto your computers; for example, by opening an email attachment or downloading and running a file from the internet.

Make a Comment

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

3 Responses to “Viruses, Worms, and Trojan Horses”

RSS Feed for IT Certifications Comments RSS Feed

[…] * Firewalls and Proxy Servers * The Attacker’s Arsenal * Intro to PIX, ASA, IDS, and IPS * Viruses, Worms, and Trojan Horses * Preventing Virus […]

[…] xxxxx http// […]

Where's The Comment Form?

Liked it here?
Why not try sites on the blogroll...

%d bloggers like this: