We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Difference between a virus and a Trojan

essay
The whole doc is available only for registered users

A limited time offer! Get a custom sample essay written according to your requirements urgent 3h delivery guaranteed

Order Now

1. What is the main difference between a virus and a Trojan?

A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going.

A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer. Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.

2. A virus or malware can impact which of the three tenets of information systems security (confidentiality, integrity, or availability)? In what way? Viruses can send files to other people that don’t allow them to read these files, which affects confidentiality. Some viruses can break programs, affecting availability. Some viruses will change files in a program, which impacts integrity.

3. Why is it recommended to do an anti-virus signature file update before performing an anti-virus scan on your computer?

Signature files contain the latest list and behavior of known viruses. Anti-virus programs release signature file updates regularly sometimes daily, sometimes more often because new viruses are being identified on a daily basis. It is best to configure your anti-virus program to automatically check for updates these updates.

4. Why might your co-worker suggest encrypting an archive file before e-mailing it?

Any computer that handles any sensitive information should require encryption.

5. What kind of network traffic can you filter with the Windows Firewall with Advanced Security?

Inbound rules – they apply to traffic that is coming from the network or the Internet to your Windows computer or device. For example, if you are downloading a file through BitTorrent, the download of that file is filtered through an inbound rule. Outbound rules – these rules apply to traffic that is originating from your computer and going to the network and the Internet. For example, your request to load the How-To Geek website in your web browser is outbound traffic and it is filtered through an outbound rule. When the website is downloaded and loaded by your browser, this is inbound traffic. Connection security rules –less common rules that are used to secure the traffic between two specific computers while it crosses the network. This type of rule is used in very controlled environments with special security requirements. Unlike inbound and outbound rules, which are applied only to your computer or device, connection security rules require both computers involved in the communication to have the same rules applied.

6. What are typical indicators that your computer system is compromised?

When you start your computer, or when your computer has been idle for many minutes, your Internet browser opens to display Web site advertisements. When you use your browser to view Web sites, other instances of your browser open to display Web site advertisements. Your Web browser’s home page unexpectedly changes.

Web pages are unexpectedly added to your Favorites folder.
New toolbars are unexpectedly added to your Web browser.
You cannot start a program.
When you click a link in a program, the link does not work. Your Web browser suddenly closes or stops responding.
It takes a much longer time to start or to resume your computer. Components of Windows or other programs no longer work.

7. What elements are needed in a workstation domain policy regarding use of anti-virus and malicious software prevention tools?

Policies for workstation antivirus and malicious software prevention tools must be consistent. They have to be the same for all computers in the network or it won’t do any good.

Related Topics

We can write a custom essay

According to Your Specific Requirements

Order an essay
icon
300+
Materials Daily
icon
100,000+ Subjects
2000+ Topics
icon
Free Plagiarism
Checker
icon
All Materials
are Cataloged Well

Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email.

By clicking "SEND", you agree to our terms of service and privacy policy. We'll occasionally send you account related and promo emails.
Sorry, but only registered users have full access

How about getting this access
immediately?

Your Answer Is Very Helpful For Us
Thank You A Lot!

logo

Emma Taylor

online

Hi there!
Would you like to get such a paper?
How about getting a customized one?

Can't find What you were Looking for?

Get access to our huge, continuously updated knowledge base

The next update will be in:
14 : 59 : 59