Malicious Computer Programs

General terms for any computer program designed to harm its victim(s):
Virus - a program that "infects" an executable file. Possible effects:
- Only displaying a benign message on the monitor
- Deleting some or all files on the user's hard drive
- Altering data files.

Two key features of a computer virus:
- attaches itself to executable files...running executable file may make new copies of virus.
- virus causes harm only after it has infected an executable file and executable file is run.
Worm - like a virus but is a program that copies itself.

Distinction between worm/virus - a virus never copies itself – a virus is copied only when the
infected executable file is run.
Trojan Horse - a deceptively labeled program that contains at least
one function that is unknown to the user and that harms the user.

Possible consequences:
- may allow a hacker to remotely control the
victim's computer
- may collect passwords and credit card numbers and send them to the hacker
- may launch denial of service attacks on websites.
Infiltration techniques:
- installed on a victim's computer by an intruder without knowledge of the victim
- downloaded by the user
- e-mail attachment
Related Links:
cybercrime.gov Computer Crime Research Center Computer Security Institute
Overview Home