Computer Worms & Viruses
Stealth Virus
a virus in which if anyone attempted to view an infected sector, the virus would replace it with the clean, original version of the sector
20 Years
Imprisonment time for a compuer virus can range from 0 to ...
Elk Cloner
The first virus created in 1982 was the ________ virus.
Network Worm
a computer worm that copies different segments of itself to computers linked together in a network
Host Worm
a computer worm that copies itself to another computer in a network and then deletes itself completely from the previous computer in which it was contained
Macro
a fairly common virus that affects small Word automatic functions
Host Program
a large, frequently run program that the virus is attached to
Computer Virus
a malicious computer program created by a user with objectives to harm or steal another's property
Trojan Horse
a malicious program disguised inside of another program that seems beneficial or harmless
Boot Sector Virus
a virus that copies itself onto a computer off of a disk when the computer is booted up; when someone else inserts a disk into the computer, the virus is downloaded
Computer Worm
an independent program that multiplies itself by copying a segment of itself onto another computer
Piggybacking
the act of a computer virus attaching itself to another computer program
Payload
the malicious activity a computer virus or worm is designed to perform
Network and Host Worm
What are the two types of computer worms?
administrative
A Trojan horse will generally attempt to gain access to which type of area on a computer?