Viruses, Trojan Horses, and Worms
Prior to beginning work on this discussion, read Chapter 4 in the text, watch the video, and review the Cisco article.
Computer viruses are considered to be the oldest form of malware that can infect a system. These types of viruses have been around since the inception of the personal computer. The modern landscape of computing has given rise to a number of newer and more sophisticated viruses, Trojan horses, and worms that can infiltrate a computer system, opening the user to heightened risks of being victimized by cyber criminals. Individual computer users are not the only targets of these malware programs; computer criminals and hackers now target governmental and corporate computer systems on a regular basis.
Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2018). (2nd ed.). Retrieved from https://www.vitalsource.com/
CISCO. (n.d.). Retrieved from http://www.cisco.com/web/about/security/intelligence/virus-worm-diffs.html
Larkin, D. [Dom Larkin]. (2014, June 8). [Video file]. Retrieved from https://www.youtube.com/watch?v=RMaXj1Kjis8
IgnorantPCFanboys. (2011, September 22).
[Video file]. Retrieved from https://www.youtube.com/watch?v=jJRSjFqu-8Q
Mr. Fords Class. (2014, January 21).
[Video file]. Retrieved from https://www.youtube.com/watch?v=29LOaxPwPPU
Lough, D. L. (2001). (Doctoral dissertation, Virginia Polytechnic Institute and State University). Retrieved from https://theses.lib.vt.edu/theses/available/etd-04252001-234145/unrestricted/lough.dissertation.pdf
Hinduja, S. (2003). . Ethics and Information Technology, 5(1), 49-61. Retrieved from http://www.springer.com/computer/swe/journal/10676
arXter. (2009, January 8). [Video file]. Retrieved from https://www.youtube.com/watch?v=rnpntZLnF7w
Imperva. (2014, January 30).
[Video file]. Retrieved from https://www.youtube.com/watch?v=TE21JrVWlHU
. (http://ashford-mscj.weebly.com)
In your initial post define the terms computer virus, Trojan horse, and worm. Explain how each malware type functions once installed on a computer or computer system. Identify at least one computer virus, Trojan horse, or worm in operation today and describe its specific effects on systems once installed. In addition, you must evaluate the legal issues that arise as officials strive to prevent and detect each of these types of malicious programs. Examine the methods of analyzing malware attacks with regard to determining their source.