It 240 Checkpoint 8

Submitted by: Submitted by

Views: 354

Words: 470

Pages: 2

Category: Other Topics

Date Submitted: 06/26/2011 07:44 AM

Report This Essay

Boot Sector - Data sectors on a hard drive that performs the boot process. This virus infects computer systems by duplicating code either to the boot sector on a floppy disk or the partition table on a hard disk.

File - This is a virus that replace or attach themselves to executable files. This virus can spread easily when a user opens a program from the DOS DIR command.

Multipartite- A virus that expands throughout the system in various ways that is utilized to effect different sections of a program or computer.

Macro- Is a number of commands which is saved like a macro file. This is a virus that constructed in a macro formula language which is the language that is implemented into a software application. A example of this is word processor. This virus implements itself in data or document, and spreads rapidly when the document or file is accessed.

Trojan horse- A computer threat that pretends to perform a certain function but instead performs malicious acts undisclosed to the user. Can grant access to a backdoor for a hacker to exploit the user's computer.

Email worms - These are worms that spread via email. These worms may spread themselves through attachments or links and once launched they become a threat to the computer.

Instant messaging worms- This worm is propagated utilizing several different instant messaging software programs. An instant message containing a connection is sent from the infected computer to the computer the host is communicating with. The clean computer after that clicks the connection and it gets infected with the worm.

IRC worms Attack chat channels along with sending infected links to various local infected user's contacts.

File-sharing network worms- This is a type of worm that is implemented in a shared folder on a local system and infects any user that download the resource.

Internet worms- This viruses spreads across the internet, and obtain any kind of virus program or script. Scan the network for...