Research Activity: Security
Method of threat: Viruses, Trojan Horses and Worms
Describe the method of threat and how it works:
Viruses is a type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another. A viruses operates by inserting or attaching itself to a legitimate program or document that supports macros in order to execute its code. In the process, a virus has the potential to cause unexpected or damaging effects, such as harming the system software by corrupting or destroying data.
Trojan Horse is a malicious computer program that disguise itself as another application. Such as game or utility software. When the application is run, it will act as a computer virus would, deleting and corrupting files in the computer system.
Worms is a computer program that uses computer networks and finds security holes to replicate itself. They can exploit a security hole in a piece of software and operating system. While replicating they will often clog up network bandwidth and can make thing run slowly.
Provide example how it affect a system:
This three types of method have the same affect toward a system;
Describe how to prevent such threat:
To prevent this kind of threat;
References:
Describe the method of threat and how it works:
Viruses is a type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another. A viruses operates by inserting or attaching itself to a legitimate program or document that supports macros in order to execute its code. In the process, a virus has the potential to cause unexpected or damaging effects, such as harming the system software by corrupting or destroying data.
Trojan Horse is a malicious computer program that disguise itself as another application. Such as game or utility software. When the application is run, it will act as a computer virus would, deleting and corrupting files in the computer system.
Worms is a computer program that uses computer networks and finds security holes to replicate itself. They can exploit a security hole in a piece of software and operating system. While replicating they will often clog up network bandwidth and can make thing run slowly.
Provide example how it affect a system:
This three types of method have the same affect toward a system;
- It can occurs a system crash.
- Files and data can be deleted.
- It can slows down the progress of the system.
- It can cause damage to the system.
Describe how to prevent such threat:
To prevent this kind of threat;
- Install firewalls
- Do not download from an unreliable resources.
- Only trust from a reliable resource. Eg: teachers.
References:
Comments
Post a Comment