A Computer Virus is attached to a program or file, and is
designed to spread from one computer to another. It infects the computer it is installed on, and is usually spreads when the infected file (usually an .exe file) is shared with others via email, disk, USB drive, or CD. A virus has to have human action in order to launch and deliver its “payload”. The file that the virus is attached to cannot open itself; a user has to open it in order to execute the virus. Viruses have many symptoms, depending on the intent. Computer viruses can erase or corrupt files and applications, crash your system by making
so many copies of files that the hard drive fills up, or make a computer
inoperable by altering critical system files.
A Computer Worm is like a virus in that it is also attached to
a file, and the file has to be opened before infection can take place. Unlike a virus, that is passed from computer to computer via user action (usually unintentional); worms are designed to self-replicate and spread without any effort on the user’s part. When you open a file that contains a worm, it starts spreading through networks and emails immediately. The main purpose of a worm attack is to bring down systems and networks by consuming great amounts of bandwidth and memory. Worms are also used as a means for a remote attacker to
tunnel into your system. Many worms will replicate themselves by sending “clones” to everyone in your email address book. These emails are sent out immediately upon opening the infected file, and may not show up in your “sent items” folder.
A Trojan is also included in a file, and like a virus,
does not propagate itself. Trojans are tricky, in that they are often disguised as some type of useful or interesting software. When the software is installed (Trojans are normally embedded in .exe files), the Trojan is activated, and sometimes you don’t even realize its there. Trojans can do many things, and while some are designed to be dangerous, others are just annoying. A Trojan might destroy certain types of files, alter critical system files, change your desktop icons, or simply plant a “backdoor” on your system that can be used by a
hacker or cyber criminal at a later date. Trojans are usually passed from PC to PC by email or disk file transfer, because the sender doesn’t know that the file carries a harmful Trojan.
Spam is unwanted junk mail, and just as you find that junk mail in your physical mailbox is a waste of your time and a waste of the post office’s resources, so it is that e-mail junk taxes the resources of computer systems all over the world. It is estimated that about 70% of all e-mail is spam of one sort or another.