Computer Science, asked by chinmayee164, 11 months ago

difference between virus and unknown virus


garywalter1221: I'm not getting your question

Answers

Answered by Juan787
0

Home  Trojans, Worms, and Viruses

Trojans worms and viruses

The Differences Between Trojans, Worms, and Viruses

There are many different classes of malware and they have varying ways of infecting systems and propagating themselves. Malware can infect systems by being bundled with other programs or attached as macros to files. Others are installed by exploiting a known vulnerability in an operating system (OS), network device, or other software, such as a security vulnerability in a browser that only requires users to visit a website to infect their computers. The vast majority, however, are installed by some action from a user, such as clicking an email attachment or downloading a file from the Internet.

The Differences of Trojans, Worms, and Viruses

The Virus

Virus authors created these malicious light programs to create files, move files, erase files, or consume the memory space of an endpoint. Those actions cause endpoints to malfunction. Viruses can also replicate themselves, attach themselves to programs, and travel across networks. The computer virus’ impact depends on what virus on a computer or a file caught. For experts, an infected e-mail attachment is the most common means to catch a computer virus. In addition, inexperienced, ordinary users can accidentally distribute computer viruses by sharing files or sending emails to other endpoint users.

The Worm

The worm has two recognized definitions for cybersecurity experts. Computer worms go through an endpoint's memory and hard drive. A computer worm does not change any files on a machine, but it is a type of virus that replicates itself.  Nonetheless, worms can still harm by multiplying so many times that they consume all of the endpoint’s available memory or hard disk space. If a worm consumes the memory, the endpoint will run in a reduced speed and possibly even crash. If the worm attacks the hard disk space, the endpoint will take a long time to access files and the user will not have the ability to save or create new files until the worm has been eliminated.

Unlike viruses and Trojan horses, worms can replicate themselves and travel between systems without any action from the user. For these reasons, it is good to have an Advanced Endpoint Protection installed on the endpoint system that can identify and eliminate worms before they have a chance to replicate or spread to other computers. Security updates such as Windows Update also patch security gaps that allow worms to infect an endpoint.

The Trojan Horse Virus

A Trojan horse can’t replicate itself, nor can it reproduce without an end user's assistance. That’s what differentiates it from a computer virus and a worm. This is the reason why cybercriminals utilize social engineering tactics to deceive the end user into executing the Trojan. Typically, the malware programming is hidden in an authentic-looking email attachment or free download. When the user clicks on the email attachment or downloads the free program, the malware that is hidden inside is transferred to the user's computing device. Once inside, the malicious code can execute whatever task the attacker designed it to carry out.

Because the user is often unaware that a Trojan horse has been installed, it’s very important that the end user has an Advanced Endpoint Protection installed in their endpoint system. This makes sure that the malware is isolated and removed.

Comodo Designed AEP to Eliminate Trojans, Worms, and Viruses

Comodo Cybersecurity’s Advanced Endpoint Protection (AEP) can solve the Trojan horse issues of our customers because it has enough features to restrict different types of malware including trojans, worms, and viruses. It blocks malicious files and automatically contains unknown files in a virtual container using Default Deny Platform and containerization technology.


Similar questions