Most of us don't make a real difference between worm, virus and Trajan Horse or refer to a worm or Trojan Horse as a virus.
We know they are malicious programs that can cause very serious damage to PC. However there are differences among the three, and knowing those differences can help you to better protect your computer from their often damaging effects.
A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Some viruses cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it cannot infect your computer unless you run or open the malicious program. A virus cannot be spread without a human action, (such as running an infected program) to keep it going. People continue the spread of a computer virus, mostly unknowingly, by sharing infecting files or sending e-mails with viruses as attachments in the e-mail.
A worm is a program or algorithm that replicates itself. A worm has the capability to travel without any help from a person from PC to PC and have ability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect.
ATrojanHorse is a destructive program that "working" as a benign application ( (like changing your desktop, adding silly active desktop icons) or can cause serious damage by deleting files and destroying information on your system.Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised.Trojans do not reproduce by infecting other files nor do they self-replicate.
Added into the mix, we also have what is called a blended threat. Blended threats combine the characteristics of viruses, worms,TrojanHorses, and malicious code with server and Internet vulnerabilities. By using multiple methods and techniques, blended threats can rapidly spread and cause widespread damage. Characteristics of blended threats include: causes harm, propagates by multiple methods, attacks from multiple points, and exploits vulnerabilities. This combination of method and techniques means blended threats can spread quickly and cause widespread damage. They are considered to be the worst risk to security since the inception of viruses, as most blended threats require no human intervention to propagate.
Therefore is very important to protect your PC with a good anti-virus software installed on your system with the latest fixes for new viruses, worms, andTrojanhorses.
Additionally, you want to make sure your anti-virus program has the ability to scan e-mail and files as they are downloaded from the Internet. This will help prevent malicious programs from even reaching your computer. You should also install a system that prevents unauthorized use and access to your computer (firewall as well). A good software firewall will protect your computer from outside attempts to control or gain access your computer, and usually provides additional protection against the most commonTrojanprograms or e-mail worms.
FAQs
Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate. Trojans must spread through user interaction such as opening an email attachment or downloading and running a file from the Internet.
What is the difference between virus worm and Trojan? ›
Malware vs worm vs virus
A virus is very specific in the sense that it self-replicates by adding its code to other applications. In a comparison of malware vs. worm, malware is more dangerous because it encompasses both worms and all other software-based threats, such as spyware, ransomware, and Trojans.
How was a worm different from a Trojan? ›
A worm spreads through a network, whereas a Trojan hides inside another program. A worm prevents a device from functioning until a ransom is paid, whereas a Trojan gathers information and transmits it to another device.
What's the difference between a virus and a Trojan horse? ›
A Virus is a malicious executable code attached to another executable file which can be harmless or can modify or delete data. Trojan Horse is a form of malware that captures some important information about a computer system or a computer network.
What is a similarity between a Trojan horse and a worm? ›
A computer worm is a form of virus, specifically the type that self-replicates. These computer worms basically perform malicious actions in the same way that a virus or Trojan Horse would. Worms will scan their local network or search the internet from their host device, looking for vulnerabilities to exploit.
What is the difference between a virus and a Trojan quizlet? ›
A Trojan horse is not a virus. It is a destructive program that looks as a genuine application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.
What is an example of a worm virus? ›
A worm virus is a computer virus that can self-replicate, mostly without human intervention. Other kinds of computer viruses rely more on curiosity or user naivete to spread. The ILOVEYOU, Michelangelo, and MSBlast worms are famous examples.
How is a worm different from a Trojan Quizlet? ›
How is a worm different from a Trojan? A worm spreads through a network, whereas a Trojan hides inside another program.
What is an example of a Trojan horse virus? ›
Examples of Trojan horse virus attacks
Well-known examples of Trojans include: Rakhni Trojan: The Rakhni Trojan delivers ransomware or a cryptojacker tool—which enables an attacker to use a device to mine cryptocurrency—to infect devices. Tiny Banker: Tiny Banker enables hackers to steal users' financial details.
Which of the following defines the difference between a Trojan horse and a worm select the best answer? ›
The primary difference between a Trojan horse and a worm is that worms will self-replicate without any user intervention; Trojan horses do not self-replicate. D.An armored virus attempts to make disassembly difficult for an antivirus software program. It thwarts attempts at code examination.
Can Trojan viruses be removed? Trojan viruses can be removed in various ways. If you know which software contains the malware, you can simply uninstall it. However, the most effective way to remove all traces of a Trojan virus is to install antivirus software capable of detecting and removing Trojans.
Is Zeus a virus or a Trojan? ›
Zeus is a Trojan horse malware package that runs on versions of Microsoft Windows. It is often used to steal banking information by man-in-the-browser keystroke logging and form grabbing. Zeus is spread mainly through drive-by downloads and phishing schemes.
What are the 4 types of malware? ›
Types of malware include computer viruses, worms, Trojan horses, ransomware and spyware.
What distinguishes Trojan from viruses and worms? ›
Unlike viruses and worms, Trojans do not self-replicate. They rely on social engineering tactics to trick users into running them. Once executed, Trojans can perform a variety of harmful actions, such as stealing sensitive information, granting unauthorized access to the system, or installing other malware.
Which of the following is the major difference between worms and Trojan horses? ›
In contrast, a worm does not depend on another piece of software and is self replicating. Trojan horse software may or may not be self replicating but is disguised within some other software that a user might be enticed to activate on their computer.
What's the difference between a virus and a worm? ›
The primary difference between a virus and a worm is that viruses must be triggered by their host/victim's interaction with the infected file. In contrast, worms are stand-alone malicious programs that can self-replicate and propagate independently as soon as they have breached the system.
Is trojan a virus or not? ›
A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program. The delivery method typically sees an attacker use social engineering to hide malicious code within legitimate software to try and gain users' system access with their software.
What are viruses worms and Trojans common know as? ›
Malware is a malicious software which is typically used to infect computers or networks. Common types of malware include viruses, worms, trojans, ransomware, adware, spyware, rootkits, keyloggers, fileless malware, cryptojacking, and hybrid malware.
Is a worm a virus? ›
Worm Virus Definition
A worm is different from a virus, however, because a worm can operate on its own while a virus needs a host computer.
How do I know if I have Trojan virus? ›
To find it, the user must initiate a full computer scan with an anti-virus scanner. This should be able to identify all threats and inform the user of the name of the malware. In addition, the scanner usually recommends the necessary measures to completely remove the Trojan and the installed malware from the system.