Differences Between Worms and Viruses
Differences Between Worms and Viruses
Differences Between Worms and Viruses
Region III
PRESIDENT RAMON MAGSAYSAY STATE UNIVERSITY
Iba, Zambales
________________________________________________________________________
Introduction
in general inflict some other “bad” or illegitimate action on data, hosts, or networks.
There are many different classes of malware that have varying ways of infecting
systems and propagating themselves. Malware can infect systems by being bundled with
Two of the most common types of malware are viruses and worms.
As defined in the "Security of the Internet" report, released in 1996 by the CERT
worms "are self-replicating programs that spread with no human intervention after they
are started." In contrast, "[v]iruses are also self-replicating programs, but usually require
some action on the part of the user to spread inadvertently to other programs or
systems."
A computer virus is a type of malicious code or program written to alter the way a
computer operates and is designed to spread from one computer to another. A virus
supports macros in order to execute its code. In the process, a virus has the potential to
Once a virus has successfully attached to a program, file, or document, the virus
will lie dormant until circumstances cause the computer or device to execute its code. In
order for a virus to infect your computer, you have to run the infected program, which in
This means that a virus can remain dormant on your computer, without showing
major signs or symptoms. However, once the virus infects your computer, the virus can
infect other computers on the same network. Stealing passwords or data, logging
keystrokes, corrupting files, spamming your email contacts, and even taking over your
machine are just some of the devastating and irritating things a virus can do.
While some viruses can be playful in intent and effect, others can have profound and
damaging effects. This includes erasing data or causing permanent damage to your hard
disk. Worse yet, some viruses are designed with financial gains in mind.
In a constantly connected world, you can contract a computer virus in many ways,
some more obvious than others. Viruses can be spread through email and text message
attachments, Internet file downloads, and social media scam links. Your mobile devices
and smartphones can become infected with mobile viruses through shady app
downloads. Viruses can hide disguised as attachments of socially shareable content such
To avoid contact with a virus, it’s important to exercise caution when surfing the
web, downloading files, and opening links or attachments. To help stay safe, never
download text or email attachments that you’re not expecting, or files from websites you
don’t trust.
A computer virus attack can produce a variety of symptoms. Here are some of them:
Pop-ups might encourage you to visit unusual sites. Or they might prod you to
Mass emails being sent from your email account. A criminal may take control of
your account or send emails in your name from another infected computer.
Frequent crashes. A virus can inflict major damage on your hard drive. This may
cause your device to freeze or crash. It may also prevent your device from coming
back on.
Unknown programs that start up when you turn on your computer. You may
become aware of the unfamiliar program when you start your computer. Or you
Unusual activities like password changes. This could prevent you from logging into
your computer.
How can you help protect your devices against computer viruses?
Here are some of the things you can do to help keep your computer safe.
Use a trusted antivirus product, such as Norton AntiVirus Basic, and keep it
updated with the latest virus definitions. Norton Security Premium offers
This type of virus can take control when you start — or boot — your computer.
One way it can spread is by plugging an infected USB drive into your computer.
2. Browser hijacker
This type of virus “hijacks” certain web browser functions, and you may be
3. Resident virus
This is a general term for any virus that inserts itself in a computer system’s
memory. A resident virus can execute anytime when an operating system loads.
This type of virus comes into action when you execute a file containing a virus.
6. Polymorphic virus
A polymorphic virus changes its code each time an infected file is executed. It
does this to evade antivirus programs.
This common virus inserts malicious code into executable files — files used to
8. Multipartite virus
This kind of virus infects and spreads in multiple ways. It can infect both program
9. Macro virus
Macro viruses are written in the same macro language used for software
applications. Such viruses spread when you open an infected document, often through
email attachments.
You can take two approaches to removing a computer virus. One is the manual
program.
Want to do it yourself?
There can be a lot of variables when it comes to removing a computer virus. This process
usually begins by doing a web search. You may be asked to perform a long list of steps.
You’ll need time and probably some expertise to complete the process.
If you prefer a simpler approach, you can usually remove a computer virus by using an
antivirus software program.
Worms are a self-replicating type of malware (and a type of virus) that enter networks by
exploiting vulnerabilities, moving quickly from one computer to another. Because of this,
worms can propagate themselves and spread very quickly – not only locally, but have the
potential to disrupt systems worldwide.
Unlike a typical virus, worms don’t attach to a file or program. Instead, they slither and
enter computers through a vulnerability in the network, self-replicating and spreading
before you’re able to remove the worm. But by then, they’ll already have consumed all
the bandwidth of the network, interrupting and arresting large network and web servers.
A bot worm may be used to infect computers and turn them into zombies or bots, with
the intent of using them in coordinated attacks through botnets. Instant messaging,
or IM worms propagate through instant messaging services and exploit access to contact
lists on victim computers.
Email worms are usually spread as malicious executable files attached to what appear to
be ordinary email messages. The email worm spreads by forcing an infected system to
resend the worm to email addresses in user contact lists; the worm infects new systems
when email recipients open the file. Successful email worms usually incorporate social
engineering methods to prompt users to open the attached file.
An ethical worm is a computer worm designed to propagate across networks with the
express purpose of delivering patches for known security vulnerabilities. While ethical
worms have been described and discussed in academia, actual examples in the wild have
not been found, most likely because the potential for unexpected harm done to systems
that react unexpectedly to such software outweighs the potential for removing
vulnerabilities. In any case, unleashing any piece of software that makes changes to a
system without the permission of the system owner opens the publisher to various
criminal and civil charges.
Users should practice good cybersecurity hygiene to protect themselves against being
infected with computer worms. Measures that will help prevent computer worm
infections include:
Keeping up to date with operating systems and all other software patches and
updates will help reduce the risk due to newly discovered vulnerabilities.
Using firewalls will help reduce access to systems by malicious software, while
using antivirus software will help in preventing malicious software from running.
Being careful with links in email or other messaging applications, which may expose
systems to malicious software. Likewise, attachments to messages from unknown
senders are also often used as vectors for distributing malicious software.
Although some worms are designed to do nothing more than propagate themselves to
new victim systems, most worms are associated with viruses, rootkits or other malicious
software.
The first step to remove a computer worm is to detect the presence of the worm, which
can be difficult.
Removing a computer worm can be difficult. In extreme cases, the system may need
to be formatted, and all the software reinstalled. If it is possible to identify the computer
worm infecting the system, there may be specific instructions or tools available to
remove the infection. However, the system should be disconnected from the internet or
any network, wired or wireless, before attempting to remove the computer worm;
removable storage devices should also be removed and scanned separately for
infections.
Software that a user may perceive as unwanted. This may include adware,
spyware, or browser hijackers. Such software may use an implementation that can
compromise privacy or weaken the computer’s security. Companies often bundle a
wanted program download with a wrapper application and may offer to install an
unwanted application, in some cases without providing a clear opt-out method.
Adware
Spyware
A software that aims to gather information about a person or organization
without their knowledge, that may send such information to another entity without the
consumer’s knowledge.
Browser Hijacker