 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
|
|
Computer
Viruses, Worms, and Trojan Horses
|
|
|
|
|
What
are viruses, worms, and Trojan horses?
|
|
|
|
|
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
|
Worm copies
|
|
itself repeatedly,
|
|
using up
|
|
|
resources
|
|
|
and possibly
|
|
|
shutting down
|
|
|
computer or
|
|
|
network
|
|
|
|
|
 |
 |
 |
 |
 |
 |
|
Virus is a
|
|
potentially
|
|
|
damaging
|
|
|
computer
|
|
|
program
|
|
|
|
|
 |
 |
 |
 |
 |
 |
 |
 |
|
Trojan horse
|
|
|
hides within
|
|
|
|
or looks like
|
|
|
legitimate
|
|
program until
|
|
triggered
|
|
|
|
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
|
Payload
|
|
|
(destructive
|
|
|
|
event) that is
|
|
|
delivered when
|
|
|
you open file, run
|
|
infected program,
|
|
|
or boot computer
|
|
|
with infected disk
|
|
in disk drive
|
|
|
|
|
|
|
|
|
|
|
|
|
|
 |
 |
 |
 |
 |
 |
 |
 |
|
Does not
|
|
|
|
replicate
|
|
|
itself on
|
|
|
other
|
|
computers
|
|
|
|
|
 |
 |
 |
 |
|
Can spread
|
|
and damage
|
|
files
|
|
|
|
|
|
|
|
|
|
|
|
|
 |
|
|
 |
|
|
|
|
|