Abstract
The paper highlights the major threats to our personal computers. There may be internal or external threats to our system. Some of these include boot sector, multipartite, attack of worms and viruses, macro, Trojan horse etc. The author has attempted to define all these terms precisely and to the best of his knowledge.
INTRODUCTION TO LAN TECHNOLOGIES
Boot Sector: Virus that contaminates the first sector, which is usually a bootable disk, is known as boot sector virus. The virus is especially dangerous as it does not merely affect files but instead affects the disk itself.
File: A file is used to store data on the computer and there are many viruses that can affect various computer files, but mainly target executable files that can help spread the virus entirely.
Multipartite: A virus that affects the system in multiple ways is termed as Multipartite. These kinds of viruses are categorized under file infectors and boot infectors.
Macro: A macro virus is defined as the virus created in macro language as it allows embedding itself in documents which when opened helps in fast spread of the virus. The virus replaces itself in place of normal macros and on opening the file it starts multiplying and spreading throughout the system.
Trojan Horse: Trojan horse is not merely a computer virus affecting files but instead is a malicious program that copies itself and harms host computers by stealing information. Trojans are categorized as malwares.
Email worms: These are often referred as mass mailing worms which affect the computer when an attachment sent through email is opened. Once opened, it multiplies at a rapid rate and affects the entire system.
Instant Messaging worms: It is a self-replicating malicious code that spreads through Instant Messenger networks.
IRC worms: Internet Relay Chat (IRC) worms are particularly dangerous as they target chat channels by sending infected web pages or links to users. File-sharing networks worms: Such kinds of worms replicates themselves and appear as harmless names in shared folders. Once the file is shared, the worm spreads throughout the network.
Internet worms: These worms find vulnerable computers and connect to them using the local operating system. Once connected they scan the systems and send request via which they install themselves into the computer.
As researched in week 7 paper, unstructured hackers typically use Trojan Horses to gather information of organizations and businesses. Alternatively, structured hackers make use of multiple viruses and worms such as file-sharing network worms, email worms, macro virus and Trojan horses in order to conduct a structured hacking plan.
References
1. Welcome to Virus or Hoax (2010) . Retrieved from http://virusall.com/computer%20worms/worms.php
2. Ethics in Computing, NC state university (2011). Retrieved from http://ethics.csc.ncsu.edu/abuse/wvt/
3. Beal V. (2011) The difference between a computer virus, worm and Trojan horse. 29 March 2011. Retrieved from http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp