Page 92 - trackpad v5.1 class 5 flipbook
P. 92

WORMS

                  A worm is a self-propagating program that works without human intervention. It is a kind
                  of malware that uses a computer network to send copies of itself to another computer on
                  the same network.
                  Worms do not require human action to activate or spread once they are inside a network.

                  They are designed to propagate automatically without user interaction, unlike viruses,
                  which often require user actions such as opening a file.

                  How Do Worms Work?

                  They can be sent through e-mails and once we open                   Just as rust weakens and
                  these  links, they  provide  a link to malicious files             damages a bridge, a virus
                  and download automatically.  Once installed,  they                 weakens and damages the
                  replicate themselves without the knowledge of the                   functions of a computer.
                  user.


                  Symptoms of Worms

                     The memory of the computer gets occupied and storage capacity lowers.
                     Programs start crashing and do not run properly.

                     Files get deleted and replaced automatically on the computer.

                  Effects of Worms

                     They cause severe harm to the network by blocking it and reducing its speed.
                     They can change the content of the files and also delete them.

                     They can sometimes insert additional malicious software into the computer.

                     They steal data and also gain control over your computer.




                       Tick ( ) if you know this.

                       ▶   A malware that can spread itself from one computer to another
                       ▶   A worm that uses a network to send copies of itself to another computer on the
                          same network


                  TROJAN HORSE

                  Trojan horse or Horse conceals itself inside the software that seems legitimate. It has
                  the ability to cause serious damage when they enter the computer. Once installed,

                  they allow unauthorised access to the computer making it easier for it to be remotely
                  controlled by someone else. This may lead to loss of personal data and confidential
                  information.





                   90   Pro (V5.1)-V
   87   88   89   90   91   92   93   94   95   96   97