Wednesday, October 30, 2013

Virus-related Terms for Dummies (or college students)


In our tech-savvy world, we all generally like to think that we are in the know about technological innovations, uses, and lingo, but sometimes we get stumped when we really think about what certain things mean or don't mean.

This blog is mainly about viruses, but is it solely about that? Maybe not. It's hard to talk about viruses and not mention other words such as "worms" and "trojan horses," for example. What do these three things mean? I think a lot of us, myself included, might be tempted to say that they are one in the same. Although we might not be too far off, there are a couple specific differences that this blog will address. These definitions and explanations will be good to know, especially as knowing what exactly each term means can allow us to protect ourselves better on the web.

So, here we go:


  • Viruses: The most common, this term is basically describing what we think of when we refer to different malware terms. The easiest way to identify a virus is seeing if it lines up with 2 main criteria, according to the source used for this article (Symantec Corp.):
    1. It must execute itself. It will often place its own code in the path of execution of another program.
    2. It must replicate itself. For example, it may replace other executable files with a copy of the virus infected file. 
An example of this is in the previously blogged about "ILOVEYOU" virus. It executed itself when clicked on, with users thinking they were opening a .txt file, and once it did, it replicated itself by overwriting music and media files. 

  • Trojan Horse: these, explaining their name, are basically impostors. Trojan's disguise themselves as a desirable file, but are in fact very malicious. They contain malicious code that, when triggered, attacks and steals data. 
    • The difference between Trojans and Viruses: unlike viruses, Trojans DO NOT replicate themselves, they just attack when executed, and don't necessarily linger.
  • Worms: often, this term is used interchangeably with the term "Viruses," and the reason is because they aren't extremely different. Worms ARE programs that replicate themselves from system to system. The DIFFERENCE is that they don't technically use a host file, but travel in one that the worms themselves release. 
    • Worms generally travel in commonly used files like Word or Excel, and what they do is they themselves (the worms) release one of these files with the worm already inside it. This file will then travel computer to computer without the knowledge of the infected. 


Was this helpful? Did it clear up any thoughts or questions? Which of the three worry you most? Let us know!

Source:
  • http://www.symantec.com/business/support/index?page=content&id=TECH98539

8 comments:

  1. This definitely helped clear some things up. I am most worried about worms since the user might not know that it is infected and they also don't use a host file.

    ReplyDelete
  2. Thanks for the clarification. I am most worried about viruses. I feel like their attacks are quite forceful and happen quickly replacing and replicating themselves within your virtual workspace.

    ReplyDelete
    Replies
    1. I certainly share your view. Viruses are usually better developed in complexity as opposed to worms and trojans. Thus, it is harder to find and get rid of them. Additionally, due to their mechanism of replicating themselves, like you said, their damage can be tremendous. Luckily, most viruses do not usually infect computers just by themselves. They have to be allowed by some sort of our own actions, such as clicking on an email. They also , I would say, in most cases are more recognizable to avoid than trojans which disguise themselves, and worms which do not even need host files to spread.

      Triet Pham

      Delete
  3. Thank you for specifying these terms. I am still curious which type of infection allows other infections to enter the system? I've heard of trojan horses acting as gateways or "backdoors," welcoming other viruses, trojans, and worms into the system, but I am still unsure if it is in fact a trojan, and how the infection is best avoided. Any further information about this would be appreciate, thank you.

    ReplyDelete
    Replies
    1. Thanks for your comment Levi! Trojan viruses with backdoor capabilities do exist, and are very dangerous. The thing that makes them dangerous is not, however, that they welcome other viruses into the system, but rather that they can allow a hacker or a bot to come into your computer to control things and steal information. Virus (including trojan) detection and prevention software can help guard against backdoor trojans.

      Delete
  4. Worms seem to be worrisome as they can travel from computer to computer without the users even realizing its there at all, so it seems like it could take over before anyone even thinks to stop it. But on the other hand, viruses seem like the most dangerous because they open themselves and replicate. It seems like viruses could definitely do the most damage. How can we identify them without anti virus software?

    ReplyDelete
    Replies
    1. There isn't an incredibly foolproof way to catch them without anti virus software. You could be clued in to the existence of a virus by flags such as your computer slowing down, an increase in spam mail, a friend telling you they got spammed from your email account, etc. At the end of the day though, it's best to be safe and have some sort of anti virus software.

      Delete
  5. Thanks for the clarification. The information defiantly helps know different kind of viruses. I wouldn't be so worried because i carry an apple device which rarely get these kind of issues.

    ReplyDelete