Page 106 - Trackpad_V1_Book 5_Flipbook
P. 106
It does not require human action to activate it. But for the worm to be activated, someone
needs to insert it directly into a network of interconnected computers where information
can be exchanged between them.
How Do Worms Work?
They can be sent through e-mails and once we open these links, they provide a link to
malicious files and download automatically. Once installed, they replicate themselves
without the knowledge of the user.
Symptoms of Worms
The memory of the computer gets occupied and storage capacity lowers.
Programs start crashing and do not run properly.
Files get deleted and replaced automatically on the computer.
Effects of Worms
They cause severe harm to the network by blocking it and reducing its speed.
They can change the content of the files and also delete them.
They can sometimes insert additional malicious software into the computer.
They steal data and also gain control over your computer.
Tick ( ) if you know this.
▶ A malware that can spread itself from one computer to another
▶ A worm that uses a network to send copies of itself to another computer on the
same network
TROJAN HORSE
A Trojan horse or Horse conceals itself inside the software that seems legitimate. It has the
ability to cause serious damage when they enter the computer. Once installed, they allow
unauthorised access to the computer making it easier for it to be remotely controlled by
someone else. This may lead to the loss of personal data and confidential information.
uiz Bee Which type of malware spreads on its own?
______________________________________________________
104 Trackpad (Version 1.0)-V

