Viruses, worms, Trojans, and illicit servers are types of malicious programs that can harm computer systems. Viruses spread by infecting other files without permission and can corrupt or destroy data. Worms replicate themselves across networks and may deposit other harmful programs. Trojans appear harmless but contain malicious code. Illicit servers install hidden services that allow remote control of infected computers and enable activities like password theft and file transfer without consent.
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
183 views
Malware Programs Table
Viruses, worms, Trojans, and illicit servers are types of malicious programs that can harm computer systems. Viruses spread by infecting other files without permission and can corrupt or destroy data. Worms replicate themselves across networks and may deposit other harmful programs. Trojans appear harmless but contain malicious code. Illicit servers install hidden services that allow remote control of infected computers and enable activities like password theft and file transfer without consent.
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2
Program
Virus
Worms
Trojans
Illicit Server
Example of the one or what they do
A virus is a malicious program designed to damage computer systems, from stand-alone computers to entire networks. Specifically, a virus is a program that assumes control of system operations, and damages or destroys data. Viruses are loaded onto your computer without your knowledge and run without your consent. All computer viruses are man-made and are often designed to spread to other computer users through networks or e-mail address books. A simple virus can: Display harmless messages on the screen. Use all available memory, thereby slowing or halting all other processes. Corrupt or destroy data files. Erase the contents of an entire hard disk A worm is a self-replicating program or algorithm that consumes system and network resources. The difference between a worm and a virus is that a worm automatically spreads from one computer to another, whereas a virus requires some form of action from an end user, administrator or program. A worm can reside in active memory and replicate on the network. Sometimes a worm changes system files; sometimes a worm deposits a payload, which can be an illicit server or Trojan. Worms can spread to all computers connected to a network and are commonly spread over the Internet via e-mail attachments. A Trojan is a program that appears to be harmless but actually produces harmful results. Trojans contain code that produces malicious or harmful results within applications that appear benign, such as computer games. Unlike worms and viruses, Trojans do not replicate themselves or copy themselves to other files and disks. A Trojan may be spread as part of a computer virus. One of the most sinister Trojan types is a program that claims to find and destroy computer viruses, but introduces viruses into your system instead. An illicit server is an application that installs hidden services on systems. Many illicit servers, such as NetBus and Back Orifice (a play on Microsoft's Back Office), are remote control or remote access programs. Attackers can use illicit servers to perform malicious operations on infected computers, such as: Creating custom startup messages. Editing the Windows registry files. Sending messages. Changing the Desktop display. Playing sounds. Switching off the display screen. Disabling keyboard keys. Hiding the mouse cursor.
Hiding the taskbar.
Stealing passwords. Monitoring keystrokes. Restarting the computer. Locking up the computer. Executing applications. Viewing the contents of files. Transferring files to and from the computer.
Test Bank for Complete A+ Guide to IT Hardware and Software: AA CompTIA A+ Core 1 (220-1001) & CompTIA A+ Core 2 (220-1002) Textbook, 8th Edition, Cheryl A. Schmidt pdf download