This is a type of computer program that, when executed, replicates and attaches itself to other files, such as a legitimate program, by inserting its own code into it.
virus
15
Most of these require end-user interaction to initiate activation, and can be written to act on a specific date or time.
virus
15
This can be spread through removable media such as USB flash drives, Internet downloads and email attachments.
virus
15
This was released in 1999 and spread via email, affecting tens of thousands of users and causing an estimated $1.2 billion in damage.
Melissa virus
15
This is a malicious software program that replicates by independently exploiting vulnerabilities in networks.
worm
15
This can run by itself.
worm
15
Other than the initial infection of the host, these do not require user participation and can spread very quickly over the network, usually slowing it down.
worm
15
These share similar patterns: they exploit system vulnerabilities, they have a way to propagate themselves and they all contain malicious code (payload) to cause damage to computer systems or networks.
worm
15
In 2001, this infected over 300,000 servers in just 19 hours.
the Code Red worm
15
This is malware that carries out malicious operations by masking its true intent.
Trojan horse
15
This appears legitimate but is, in fact, very dangerous.
Trojan horse
15
This exploits the privileges of the user who runs it.
Trojan horse
15
This does not self-replicate but often binds itself to non-executable files, such as image, audio or video files, acting as a decoy to harm the systems of unsuspecting users.
Trojan horse
15
This is a malicious program that waits for a trigger, such as a specified date or database entry, to set off the malicious code.
logic bomb
15
This will remain inactive until the trigger event happens.
logic bomb
15
This can attack and destroy the hardware components in a device or server, including the cooling fans, central processing unit (CPU), memory, hard drives and power supplies.