Friday, July 26, 2019
Summaries Essay Example | Topics and Well Written Essays - 500 words - 1
Summaries - Essay Example Among these sources of threats include malicious codes, industrial espionage, malicious hackers, loss of some physical and infrastructural support, incidences of employee sabotage, fraud and theft, errors and omissions, and threats to personal privacy. A computer virus is a code segment that is capable of replicating by possibly attaching copies of it to existing executable files, implying that viruses can exist in a computer without infecting the system; not unless one opens or runs the malicious program. It is majorly spread by sharing of infected files through emails and removable disks. A worm, on the other hand, is a self-replicating program or algorithm which has the capability of creating copies of it and thereafter executing without the requirement of a host program or user interventions. Just like in the case of viruses, worms exploit the use of network services to propagate itself to other hosts systems within the network topology. A Trojan horse is a program which performs a desired task, however, which also includes the unexpected functions. After installation or running of the Trojan horse, it gets activated and starts to alter the desktops by adding ridiculous active desktop icons; deleting files and destroying other information on the systems; and creating backdoor on the computer systems to offer malicious users the easy lee-ways into the system. Its unique feature that explicitly distinguishes it from worms and viruses are that it does not actually replicate/ reproduce by infecting other files. A Blended threat is rather more sophisticated in the sense that it bundles the worst known features or viruses, worms, Trojan horse and malicious codes. For its aided transmission, it can exploit the server and the linked internet vulnerabilities to initiate, and thereafter transmit by spreading its attacks to other various systems interlinked within the network structure. Blended threats are characterized by
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.