Preview

Computer Worms

Good Essays
Open Document
Open Document
594 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Worms
CSC 220 Operating Systems | Worms | Web Quest 3 | | Charles Harr | 4/17/2013 |

Charles Harr 4/17/2013
CSC 220 WebQuest 3

Worms

Worms are one of the most ill-defined concepts in Network Security and are among the most common types of malware. They spread over computer networks by finding operating system vulnerabilities. Worms typically cause harm to their host networks by consuming bandwidth and shorting out web servers. Generally, the intent of the worm is to be malicious. There are some worms however, which do not have malicious intent. They are referred to as anti-worms. Computer worms are classified as a type of computer virus, but there are several characteristics that distinguish computer worms from regular viruses. A major difference is the fact that viruses spread through human activity (running a program, opening a file and such) while computer worms have the ability to spread automatically without human initiation. In addition to being able to spread without a person, computer worms have the ability to self-replicate. This means that a worm can create more than one copy of itself to send to other computers. This often happens through the sending of chain e-mails to infected users’ email contacts. What is a worm intended to do? It depends on the person who created the worm. Usually a worm is created to gather personal information from a host. It may also create what we call a ‘backdoor’, which lets the creator of the worm to control the host or simply delete all data from it.

Some symptoms of Computer Worms are: * Freezing/crashing * Programs opening and running automatically * Irregular web browser performance * Unusual computer behavior (messages, images, sounds and such) * Firewall warnings * Missing or modified files * Operating system errors and system error messages * Slow computer performance

Any and or all of these

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Botnet - Attackers use botnets to automatically run and distribute malicious software on “agent” servers. They are commonly used in DDoS attacks and spam campaigns.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    |Instant messaging worms – A worm that can replicate it’s self and uses the user’s buddy list and address book on an instant messaging application to |…

    • 829 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Internet worms – A worm that self-replicates and self-distributes copies of itself to its host network.…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Malicious software, referred to as malware, can contain a variety of threats, from data loss to system failures. There are several types of worms, viruses, Trojan horses and spyware, which can be delivered in a variety of ways. Computer viruses are a type of software or executable file that attaches itself to other programs to be uses. Viruses can cause system failures, rewrite hard drives, or destroy files and programs. Worms are similar to viruses, but are independent programs, rather that attaching to others. Viruses have a tendency to spread more rapidly over networks and through e-mail. Trojan horses are based off their namesake, in which they appear to benign types of programs, but when executed can introduce malware into your system. Spyware is programing that can track computer use. Forms of…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lab 2

    • 639 Words
    • 2 Pages

    1. What are the various types of malware? How do worms differ from viruses? Do Trojan…

    • 639 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The CNC Machinist: Quiz

    • 7255 Words
    • 53 Pages

    A virus is software that is written with malicious intent to cause annoyance or damage. Question options:…

    • 7255 Words
    • 53 Pages
    Powerful Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    There are cybercriminals who commit crimes using the computers and networks. They spread malicious viruses through the networks such as worms and Trojan horses. They hack other people's computers to steal important data and identity or destroy data. A hacker uses a packet sniffer to intercept the unencrypted network traffic and capture the passwords or other important information which was communicated through the network. Botnet or a Zombie computer is a computer which a hacker uses to spread viruses and to commit cybercrimes while the owner of the computer is unaware of it.…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Good Essays

    * This worm spreads itself by sending an instant message to people in your contact list. When they receive the connection the worm establishes a connection to the remote computer to move itself on the clean remote computer.…

    • 669 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Spyware

    • 2042 Words
    • 9 Pages

    Freeman, Lee A., and Andrew Urbaczewski. "Why Do People Hate Spyware?." Communications Of The ACM 48.8 (2005): 50-53. Business Source Elite. Web. 15 June 2013.…

    • 2042 Words
    • 9 Pages
    Better Essays
  • Satisfactory Essays

    Chipopo Research Paper

    • 343 Words
    • 2 Pages

    When a computer get infected with this virus, the computer screen will be flooded with various unexpected advertisements which can prevent a user from surfing on the Internet normally.The group of hackers created this adware to earn quick money by creating online traffic through which they can generate pay-per-click and marketing revenue.…

    • 343 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Bot-infected computers - Bots allow for a wide range of functionality and most can be updated to assume increased functionality by downloading new code and features. Attackers can use bots to perform a variety of tasks, such as setting up denial-of-service (DoS) attacks against an organization’s website, distributing spam and phishing attacks, distributing spyware and adware, propagating malicious code, and harvesting confidential information that may be used in identity theft from compromised computers—all of which can lead to serious financial and legal consequences. Attackers favor bot-infected computers with a decentralized C&C model because they are difficult to disable and allow the attackers to hide in plain sight among the massive amounts of unrelated traffic occurring over the same…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Love Bug Research Paper

    • 1326 Words
    • 6 Pages

    They don’t know the half of it. The worm is where crap really hits the fan if you will. Going back to our best friend the love bug, that was actually a worm and not a virus. The biggest difference between the two,“A worm is a standalone program that doesn’t require user intervention to spread. Worms don’t infect existing files – they spread copies of themselves instead.” (Hoffman, 2012.) Meaning it does not need a host to leach onto spread. Also worms can be remotely accessed and used, viruses cannot. Worms typically use holes in the operating systems and back doors. Viruses need human interaction to be spread across computers whether it be sending a file by way of email or putting a file on a thumb drive. Though it does need to be physically transferred. In terms of how bad they are to a system and or network though it does differ. “Worms that spread over the network can generate a large amount of traffic, slowing down the network.” (Hoffman, 2012) A worm will make things run very slow may even make your computer restart multiple times. A virus can do similar things but a virus will corrupt files on your hard drive even possibly erase the entire thing. From what I’ve read granted the worm effects a lot more computers which for networked computers it would be a nightmare. I will have to say the virus sounds more dangerous. If your computer isn’t backed up or the important files are saved…

    • 1326 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Most operating systems provide the ability to create a disaster-recovery process using distribution media or system state files. The user updated all the programs in his computer and also updated his antivirus software; however, he's still reporting unusual behavior in his computer system. The user has probably contracted a worm that has infected the system files in his computer. When the scan is complete, help the user reinstall data files and scan the system again for viruses. ClamAV is an open source solution once available only for Unix-based systems that is now available for most operating systems.…

    • 1817 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    COMPUTER VIRUS

    • 1576 Words
    • 8 Pages

    COMPUTER VIRUS AND ITS TYPES COMPUTER VIRUS Computer virus is a software program written with malicious intentions. There are number of computer viruses that can impede the functioning of your computer system. DETAIL ABOUT COMPUTER VIRUS They are replicated by themselves.…

    • 1576 Words
    • 8 Pages
    Satisfactory Essays
  • Good Essays

    viruses

    • 529 Words
    • 2 Pages

    Are viruses alive or not? To figure out this question we first have to know, what defines a living thing. According to the online Merriam-Webster Dictionary, life is in particular “an organismic state characterized by capacity for metabolism, growth, reaction to stimuli, and reproduction.”…

    • 529 Words
    • 2 Pages
    Good Essays

Related Topics