Worms and Viruses PDF
Worms and Viruses PDF
Worms and Viruses PDF
THIM TRUST’S
2022-23
TE 6TH(CE)
CASE STUDY ON
SUBMITTED BY:
Introduction: -
Worms and viruses are malicious software programs that can infect computer systems and
cause various forms of damage. Cryptography and system security are important areas of
study that deal with protecting computer systems and data from unauthorized access and
other forms of cyberattacks. In this case study, we will explore the impact of worms and
viruses on cryptography and system security.
Background:
While discussing the differences between virus and worm, it is important to first
understand the larger category of malicious programs, called "Malware". Malware can be
defined as a special kind of code or application specifically developed to harm electronic
devices or the people using those devices. Worms and viruses are both types of malware;
however, there are significant differences between them.
Worms and viruses are self-replicating software programs that can spread from one
computer to another. They can be transmitted through email attachments, file downloads,
or even by simply visiting an infected website. Once they infect a system, they can cause a
variety of problems, such as stealing sensitive information, disrupting system operations,
and even rendering the system unusable.
What is a Virus?
According to the definition, a Virus is a program developed using malicious code with a
nature that links itself to the executable files and propagates device to device. Viruses are
often transferred through the downloaded files and the shared files. They can also be
attached with a scripting program and non-executable files like images, documents, etc.
However, the virus remains dormant even after arriving on the device with the infected
files. After the user executes the infected program, the virus gets activated and starts
replicating further on its own.
● Macro Virus: This type of virus is commonly found in programs such as Microsoft
Word or Excel. These viruses are usually stored as part of a document and can
spread when the files are transmitted to other computers.
● Browser Hijacker: This virus targets and alters your browser setting. It is often
called a browser redirect virus because it redirects your browser to other malicious
websites that you don’t have any intention of visiting.
● Boot Sector Virus: These viruses are once common back when computers are
booted from floppy disks. Today, these viruses are found distributed in forms of
physical media such as external hard drives or USB. If the computer is infected
with a boot sector virus, it automatically loads into the memory enabling control of
your computer.
● Polymorphic Virus: This virus has the capability to evade antivirus programs
since it can change codes every time an infected file is performed.
● Resident Virus: A resident virus stores itself on your computer’s memory which
allows it to infect files on your computer. This virus can interfere with your
operating system leading to file and program corruption.
● Multipartite Virus: A type of virus that is very infectious and can easily spread on
your computer system. It can infect multiple parts of a system including memory,
files, and boot sector which makes it difficult to contain.
What is a Worm?
Worms are the type of virus that can self-replicate and travel from device to device using a
computer network. That means worms don't need any host to spread. They are standalone
computer malware that doesn't even require human support to execute. Usually, worms use
computer networks by exploiting vulnerabilities, and that makes them spread more
quickly.
Besides, worms stay within the memory of an infected computer, making a computer think
they are part of the system files. This helps worms to avoid any suspicious detection.
Unlike a typical virus, worms don't harm the system data. Instead, they tend to consume
system resources like CPU, memory, or network bandwidth and make the entire system or
network crash. Because of self-replicating nature, worms can even disrupt systems in a
series worldwide using a network.
Types of worms:
● Email Worms: Email Worms spread through malicious email as an attachment or a
link of a malicious website.
● Instant Messaging Worms: Instant Messaging Worms spread by sending links to
the contact list of instant messaging applications such as Messenger, WhatsApp,
Skype, etc.
● Internet Worms: Internet worm searches all available network resources using
local operating system services and/or scans compromised computers over the
Internet.
● IRC Worms: IRC Worms spread through Internet Relay Chat (IRC) chat channels,
sending infected files or links to infected websites.
● File sharing Worms: File sharing Worms place a copy of them in a shared folder
and distribute them via Peer To Peer network.
Few key differences between Virus and Worm are listed below:
● Worms usually spread using a computer network, whereas viruses use executable
files to spread from one system to others.
● The viruses are designed to corrupt, delete, or modify the target devices' data or
software, whereas worms don't harm the stored data but aim to harm the resources.
● Viruses are found in executable files or can attach themselves to executable files to
operate on target devices, whereas worms remain independent in an infected
device's memory.
● The viruses require hosts to spread from one device to another. Worms, on the other
hand, don't need any host.
● Viruses usually destroy and damage the stored data, whereas worms can harm the
entire network by using maximum resources. For example- by consuming
bandwidth, sending mass emails, or deleting or copying files in bulk.
worms and viruses can cause severe damage to the computer and other devices. It is not
enough to only use antivirus software and a firewall system. We are required to follow
proper safety guidelines to protect our devices against worms and viruses. Some of the best
practices that can be followed to be safe from worms and viruses are given below:
● Updates: We should keep our software and operating system updated. Outdated
software may have vulnerabilities, and attackers may benefit from sending viruses,
worms, or other malware into our devices.
● Monitoring: Analyzing and monitoring the system files and system activities'
behavior can help us spot suspicious actions, if any. In case the system suddenly
becomes slow, or there are several advertisements on the screen, such activities can
be a sign of an anomaly. Scanning a full system using an antivirus can be beneficial
in this situation.
Conclusion:-
In this case study, we have studied Worms and Viruses and their causes, types, differences
and ways to stay safe from them.