Preview

Worms and Trojan Horses

Good Essays
Open Document
Open Document
985 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Worms and Trojan Horses
A worm is a program than can make copies of itself from one disk drive to another. It is self contained and can also spread by copying itself using email or another form of transport. Worms can compromise the security systems of computers and can cause damage in the process. Worms sent via email usually comes in the form of a joke program or some type of software. They can cause thousands of dollars in damages. A worm would be a weapon of choice for an electronic attack that could cause widespread economic damage by disrupting and or destroying a large fraction of computers responsible for day to day business said Nicholas Weaver and Vern Paxson, two security researchers who worked on a project “Worst-Case Worm Attacks,” in collaboration with the International Computer Science Institute (ICSI) a non profit research group associated with the University of California at Berkley in 2004.
Trojan horses are programs known to have benign capabilities. It neither replicates nor copies itself, but can cause damage and or compromise the security system of a computer. Trojan horses are usually sent by individuals in the forms of email. Like the worm it is usually in the form of a joke or a software program. Some tasks that are performed by Trojan worms includes opening an internet connection that allows an outsider to gain access to information and files on the user’s computer without the user’s knowledge. Looking for passwords or confidential information stored on the computer and emailing them o the attackers address.
In life many make decisions without thinking of the repercussions. Morally it is wrong to release a worm regardless of the fact that it may be harmless or not. It may not necessarily crash a system but may slow it down for a day or two causing delays and draw backs to the many that it affects. What started out as an experiment in the head of Morris to show the glitches in Uniex operating system, turned out to be a national disaster. Based on



References: Michael J.Quinn (Fourth Edition) Ethics for the Information Age A worm is a self-contained program Pg 306 The internet worm and background of Robert Tappan Morris Jr Pg 310, 311 Ethical Evaluation and Utilitarian Evaluation Pg 312 Trojan horse is with benign capabilities Pg 313 Gregg Keizer Techweb News June 2004. http://www.informationweek.com/worst-caseworms.com Research work done by Nicholas Weaver & Vern Paxon two security researches who worked in collaboration with ICSI and University of California at Berkley NC State University http://ethics.csc.ncsu.edu/abuse/wvt/ A worm is a program than can make copies of itself from one disk drive to another. Trojan horses neither replicates nor copies itself.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    14) What term describes a malicious software program that users are tricked into running? A) Trojan horse…

    • 284 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Botnet - Attackers use botnets to automatically run and distribute malicious software on “agent” servers. They are commonly used in DDoS attacks and spam campaigns.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    |Trojan horse - A virus that allows a backdoor into a computer affecting the computer without the users knowledge and allows the information stored |…

    • 829 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    unit 7 lab 10

    • 595 Words
    • 3 Pages

    2. Trojan horse was a program that was supposed to find and destroy computer viruses. A Trojan horse may be widely redistributed as part of a computer virus. Email attachments are a way for a sender to transmit files to another user via email. In a similar way to junk mail coming in your door at home, email users regularly receive unsolicited emails from unknown senders. These emails can often contain links to malicious web sites or have attachments containing malicious software. A drive-by download is when a malicious web site you visit downloads and installs software without your knowledge. The objective of drive-by downloads is usually to install malware to record what you type and what sites you visit, to search your computer for stored passwords, or to open your computer to remote control.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Trojan horse – A type of malware that cannot self-replicate, and appears to do one action, but instead infects the computer with malicious payloads.…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Malicious software, referred to as malware, can contain a variety of threats, from data loss to system failures. There are several types of worms, viruses, Trojan horses and spyware, which can be delivered in a variety of ways. Computer viruses are a type of software or executable file that attaches itself to other programs to be uses. Viruses can cause system failures, rewrite hard drives, or destroy files and programs. Worms are similar to viruses, but are independent programs, rather that attaching to others. Viruses have a tendency to spread more rapidly over networks and through e-mail. Trojan horses are based off their namesake, in which they appear to benign types of programs, but when executed can introduce malware into your system. Spyware is programing that can track computer use. Forms of…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lab 2

    • 639 Words
    • 2 Pages

    1. What are the various types of malware? How do worms differ from viruses? Do Trojan…

    • 639 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Answer: Vandalism, Public Interest, Reveal Wrongdoing, Financial Gain, As a Protest, and The Challenge (fun).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    There are cybercriminals who commit crimes using the computers and networks. They spread malicious viruses through the networks such as worms and Trojan horses. They hack other people's computers to steal important data and identity or destroy data. A hacker uses a packet sniffer to intercept the unencrypted network traffic and capture the passwords or other important information which was communicated through the network. Botnet or a Zombie computer is a computer which a hacker uses to spread viruses and to commit cybercrimes while the owner of the computer is unaware of it.…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Better Essays

    Computer program that can copy itself and infect a computer. The term ‘computer virus’ is sometimes used as a catch-all phrase to include all types of malware, including true viruses.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Statistics Lab week 6

    • 3844 Words
    • 14 Pages

    Attacks by famous malicious code such as the Melissa or Lovebug viruses highlight the threat of “hackers”, outsiders with intent to harm…

    • 3844 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    * This worm spreads itself by sending an instant message to people in your contact list. When they receive the connection the worm establishes a connection to the remote computer to move itself on the clean remote computer.…

    • 669 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer. Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.…

    • 787 Words
    • 3 Pages
    Good Essays
  • Good Essays

    according to Morris, gauge the size of the Internet. Morris served no jail time, but…

    • 272 Words
    • 2 Pages
    Good Essays