Viruses, Trojan Horses, and Worms
Prior to beginning work on this discussion, read Chapter 4 in the text, watch the Technology in 10: Malware, Viruses, Worms, and More (Links to an external site.) video, and review the Cisco What Is the Difference: Viruses, Worms, Trojan Horses, and Bots? (Links to an external site.) article.
Computer viruses are considered to be the oldest form of malware that can infect a system. These types of viruses have been around since the inception of the personal computer. The modern landscape of computing has given rise to a number of newer and more sophisticated viruses, Trojan horses, and worms that can infiltrate a computer system, opening the user to heightened risks of being victimized by cyber criminals. Individual computer users are not the only targets of these malware programs; computer criminals and hackers now target governmental and corporate computer systems on a regular basis.
Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2018). Cybercrime and digital forensics: An introduction (2nd ed.). Retrieved from https://www.vitalsource.com/
- Chapter 4: Malware and Automated Computer Attacks
- Chapter 5: Digital Piracy and Intellectual Property Theft
CISCO. (n.d.). What is the difference: Viruses, worms, trojan horses, and bots? (Links to an external site.) Retrieved from http://www.cisco.com/web/about/security/intelligence/virus-worm-diffs.html
- This online resource, by Cisco Systems, contains detailed explanations of computer viruses, worms, Trojan horses, and bots. It will assist you in the development of this week’s discussion posts.
Accessibility Statement is not available
Larkin, D. [Dom Larkin]. (2014, June 8). Digital Piracy (Links to an external site.) [Video file]. Retrieved from https://www.youtube.com/watch?v=RMaXj1Kjis8
IgnorantPCFanboys. (2011, September 22).
Steve Wozniak: Digital piracy (Links to an external site.) [Video file]. Retrieved from https://www.youtube.com/watch?v=jJRSjFqu-8Q
Mr. Ford’s Class. (2014, January 21).
Technology in 10: Malware, Viruses, Worms, and More (Season 1 – Episode 3) (Links to an external site.) [Video file]. Retrieved from https://www.youtube.com/watch?v=29LOaxPwPPU
Lough, D. L. (2001). A taxonomy of computer attacks with applications to wireless networks (Links to an external site.) (Doctoral dissertation, Virginia Polytechnic Institute and State University). Retrieved from https://theses.lib.vt.edu/theses/available/etd-04252001-234145/unrestricted/lough.dissertation.pdf
- This dissertation examines in detail the variety of attacks that can be levied at computers and provides a taxonomy of such criminal activity. Special attention is given to attacks vie wireless networks.
Hinduja, S. (2003). Trends and patterns among online software pirates (Links to an external site.). Ethics and Information Technology, 5(1), 49-61. Retrieved from http://www.springer.com/computer/swe/journal/10676
- The full-text version of this article is available through the ProQuest database in the University of Arizona Global Campus Library. This article provides information on the trends and patterns of software pirates working on a university campus. It may assist you in the development of this week’s activities.
arXter. (2009, January 8). HARDtalk: The music industry – Digital music & piracy (Links to an external site.) [Video file]. Retrieved from https://www.youtube.com/watch?v=rnpntZLnF7w
Imperva. (2014, January 30).
Automated hacking tools – Meet the new rock stars in the cyber underground (Links to an external site.) [Video file]. Retrieved from https://www.youtube.com/watch?v=TE21JrVWlHU
MSCJ Professional Sources (Links to an external site.). (http://ashford-mscj.weebly.com)
- This resource site will provide assistance in researching additional sources for the assessments within this course.
In your initial post define the terms computer virus, Trojan horse, and worm. Explain how each malware type functions once installed on a computer or computer system. Identify at least one computer virus, Trojan horse, or worm in operation today and describe its specific effects on systems once installed. In addition, you must evaluate the legal issues that arise as officials strive to prevent and detect each of these types of malicious programs. Examine the methods of analyzing malware attacks with regard to determining their source.