DEFINITION
- Malicious code is code causing damage to a computer or system. It is code not easily or solely controlled through the use of anti-virus tools.
- Malicious code can either activate itself or be like a virus requiring user to perform an action, such as clicking on something or opening an email attachment.
COMPUTER VIRUS
- A computer virus is a potentially damaging computer program that affects or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission.
- A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels
- It may damage files and system software, including the operating system.
- Almost all viruses are attached to an executable file.
- The virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program.
- A computer virus by sharing infecting files or sending emails with viruses as attachments in the email.
- Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt.
- Examples: Melissa, Tequila, Cascade, Invader .
WORM
- A worm is a program that copies itself repeatedly.
- For example in memory or on a network, using up resources and possibly shutting down the computer or network.
- Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action.
- A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided.
- The biggest danger with a worm is its capability to replicate itself on your system.
- It will causing Web servers, network servers and individual computers to stop responding.
- Examples: Jerusalem, Sobig, Nimda, Morris Worm.
TROJAN HORSE
- A program that hides within or looks like a legitimate program. It does not replicate itself to other computers.
- At first glance will appear to be useful software but will actually do damage once installed or run on your computer.
- Examples: It can change your desktop, adding silly active desktop icons or they can cause serious damage by deleting files and destroying information on your system.
- Examples: Netbus, Back Orifice, Subseven, Beast.
DIFFERENCES OF MALICIOUS CODE
No comments:
Post a Comment