Viruses, worms, and Trojan horses are types of malicious software. A virus attaches itself to a host program and replicates, a worm spreads through network security holes, and a Trojan horse conceals malicious code behind a benign program. Trojan horses can steal passwords and files, launch denial of service attacks, and more. Users can get infected through network holes, downloads, or email attachments. Antivirus software from vendors like Trend Micro, McAfee, and Norton can help protect computers from these threats.
2. “Computer Gremlin 2” by Larry Wentzel
Definition:
A virus is a piece of self-
replicating code embedded
within another program
called the host.
2
How does my computer
catch a virus?
3.
4. Definition:
A Trojan horse is a program
with a benign capability
that conceals another,
sinister purpose.
How does my computer get a
Trojan horse?
5. What kind of malicious tasks
will a Trojan horse do?
Some examples of malicious tasks Trojan horse
programs have done are:
opening an Internet connection that allows an
outsider to gain access to files
logging the keystrokes of the user and storing
them in a file that the attacker can see
looking for passwords stored on the computer
and emailing them to the attacker
destroying files
launching a denial-of-service attack on a
website
turning the computer into a proxy server that
can be used to launch spam or stash
information from illegal activities.
6. How does my computer get
a worm?Definition:
A worm is a self-contained
program that spreads through
a computer network by
exploiting security holes in the
computers connected to the
network. Oh no, a Worm Hole!
7. • Infiltrate networks spreading all by
itself through holes in your operating
system security.
• Use up your bandwidth
• Slow computer processing down
• Open a “back door” to infiltrate your
computer
• Can cause denial-of-service attacks
interrupting web services
• Deleting subscribers from Web hosts
• May be used to control your
computer or steal information
9. References
• Quinn, M. (2011). Ethics for the information age (4th ed.). Boston, MA: Pearson
Education, Inc.
• Wentzel, L. Computer Gremlin 2. Retrieved from
http://phodyr.deviantart.com/art/Computer-Gremlin-2-323640570
Thank you!
Microsoft Office Clip Art,
audiomicro.com/free-sound-effects, and
pixabay.com for the free audio and clip art
Notes de l'éditeur
What is a Virus? No, it’s not the kind we as humans are apt to acquire. According to Quinn, a virus is a piece of self-replicating code embedded within another program called the host. A virus can be on any device that has an executable program such as a flash drive, your hard disk, a CD or DVD, email attachments, but the biggest culprit is in your downloads. When you execute the program the virus also executes and does what ever it is programmed to do.
These days most viruses are programmed to replicate occupying disk space and consuming your computers CPU time. Others are programmed to do damage to your file system or uses your email’s address book to spread the virus ridden message to your contacts.
Don’t look a gift horse in the mouth.
We’re not talking about those fat juicy night crawlers you bait your hook with in order to catch a trout; no, we are talking about those sneaky programs that squirm into your computer from the network through security holes in your software. According to Quinn, A worm is a self-contained program that spreads through a computer network by exploiting security holes in the computers connected to the network. This could be hard wire or WiFi. Is your computer hooked up to a network? Then your computer is vulnerable.
Worms are different from viruses in the way that they replicate. Worms do not need a host program to execute itself. It comes through the network by way of holes in your operating system security. It’s replication of itself may slow your computer and any network traffic. Some are designed to open a back door to your computer in order for other malware to access your information. Worms have been used to delete subscribers from web hosts and cause denial-of-service attacks.
If you are hooked up to a network, or use storage devices to load things to your computer, use protection.