Viruses, worms, and Trojans are malicious programs which enter to your computer without your permission and knowing that can cause damage, information losses, and privacies leak to your computer. They can also slow down the Internet connections, and they might even use your computer to spread themselves to your friends, family, co-workers, and the rest of the internet.
A worm, like a virus is designed to copy itself from one computer to another, but it does so automatically. First, it takes control of many features on the computer that can transport files or information. A great danger that exists is that worms have the ability to replicate in great volume. For example, a worm could send out many copies of itself to everyone listed in your e-mail address book, and their computers would then do the same, which causes a domino effect of heavy network traffic that can slow down business networks and the Internet as a whole. These new worms clog networks and possibly cause a long wait for you or anyone else to view web pages on the internet. A worm generally spreads without user action and distributes complete copies of it across networks. A worm virus can consume memory or network bandwidth, which can cause a computer to crash immediately. Because worms don 't need to travel via a host program or file, they can also tunnel into your system and allow somebody else to take control of your computer remotely also knowing as hacking.
Trojan horses are computer programs that appear to be useful software, but instead they tend to compromise your security and cause a lot of damage internally. A Trojan horse is a malicious program that is disguised as a normal application. Trojan horse programs do not replicate like a how virus does, but they can be propagated as attachments to a virus. Trojan horses cause damage or compromise the security of the computer. Trojan horses spread when people assume
References: Beal V., (June. 2010). The Difference between a Computer Virus, Worm and Trojan Horse, Retrieved from http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp Hopler W., (Sept. 2010). Reaping What You Sow: Christian Karma? Retrieved from http://www.crosswalk.com/faith/spiritual-life/reaping-what-you-sow-christian-karma-11637464.html Quinn, Michael J. (2011). Ethics for the Information Age - 4th Ed, Addison-Wesley Pearson Publications Education, Inc.