What are Virus, Worm, Trojan Horse, Blended Threats and difference between these

What are Virus, Worm, Trojan Horse, Blended Threats and difference between these- The people make most common mistake on the topic of computer virus is to a worm or Trojans as a similar thing i.e. a virus. While Trojans, worms and virus are not exactly the same thing. They all are not virus or a similar thing. Their actions, capability, the degree of the harm they cause, the method of propagation they use, every thing is different. The common thing in them is that Viruses, worms and Trojans Horses are all malicious codes and  cause severe damage to a computer, But these are differences things and it will help us a lot to protect our computer from their possible damaging effects if we know those differences better.


Image Source-www.w3technoworld.com

What Is a Virus?

A virus always attaches itself to a program or file(.Exe file) which enables it to spread one computer to another computer, and keeps leaving infection as it travels. Some virus cause a mild damage or annoying the user but some others can damage your software or files and even your hardware too. As almost all virus  attached to an executable file, but it cannot infect your computer until you run or open the .exe file containing malicious program  though the virus may exist on your computer. It always spreads by human actions like running an infected program, sharing infected files or sending/receiving emails with virus as attachments in the email.

What Is a Worm?

A worm is a sub-class of a virus and is similar to a virus by design, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which allows it to travel unaided. Its capability to replicate itself on your system is the biggest danger with a worm. Rather than your computer sending out a single worm, it will send hundreds or thousands of copies of itself, creating a huge devastating effect. Due to the replicating nature and capability to travel across networks the worm consumes too much system memory and cause servers, network servers and personal computers to stop responding. The Blaster Worm has been designed to tunnel into your system and allow cyber criminals to take control of your computer remotely.

What Is a Trojan horse?

Trojan Horse mostly appear to be coming from a legitimate software vendor or files from a legitimate source.  It usually tricks the user to open them and it is full of as much trickery as the mythological Trojan Horse was named after. The Trojan Horse, at first glance will appear to be useful software but it will actually do severe damage to your machine if installed or run on your computer.  Some Trojans are designed to be more annoying than malicious code by actions like changing your desktop, adding silly active icons to your desktop. Unlike viruses and worms, Trojans do not have the capability reproduce to infect other files nor they self-replicate. Trojans are also notorious to create a backdoor on your system to give access to malicious users to your system, There is a strong possibility of compromising or being stolen your confidential or personal information.

What Are Blended Threats?

A blended threat is a more sophisticated attack. It is a bundle of a number of the worst aspects of Trojan horses, viruses, worms, and malicious code in a single threat. Servers and Internet vulnerabilities are used by blended threats to initiate,  transmit and spreading attacks. Multiple methods are used by blended threats to propagate. They attack from multiple points simultaneously to infect system cause severe harm to the system or network. It wouldn't just launch a DDoS attack but it would also, install a backdoor and may even damage a local system in a single attack. At the same time it may modify your exe files, HTML files and registry keys. Since the inception of virus, Blended threats are considered to be the worst risk to security.  A blended threat “CodeRed” processes in the system memory and not on a hard drive which allows it to bypass anti-virus products.

To read more about DDoS Attacks, Zombie, Botnet  click here.



Reactions:

0 comments:

Post a Comment