




























































































Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Covers Some topics of Cyber security
Typology: Lecture notes
1 / 145
This page cannot be seen from the preview
Don't miss anything!
12 - 7 1 3 . 7
Parasitic virus: The traditional and still most common form of virus. A parasitic virus attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect. Memory-resident virus: Lodges in main memory as part of a resident system program. From that point on, the virus infects every program that executes. Boot sector virus: Infects a master boot record or boot record and spreads when a system is booted from the disk containing the virus.
A worm is a program that can replicate itself and send copies from computer to computer across network connections. Upon arrival, the worm may be activated to replicate and propagate. Also, the worm usually performs some unwanted function. An e-mail virus has some of the characteristics of a worm, however, we can still classify it as a virus because it requires a human to move it forward. To replicate itself, a network worm uses some sort of network vehicle. For ex. : Electronic mail facility, Remote login capability etc. The new copy of the worm program is then run on the remote system continues to spread in the same fashion. Ex: Stuxnet, used to disturb Iranian nuclear program.