Viruses, Trojan Horses, and Worms
Prior to beginning work on this discussion, read Chapter 4 in the text, watch the Technology in 10: Malware, Viruses, Worms, and More (https://www.youtube.com/watch?v=29LOaxPwPPU) video, and review the Cisco What Is the Difference: Viruses, Worms, Trojan Horses, and Bots? (https://tools.cisco.com/security/center/resources/virus_differences) article.
Computer viruses are considered to be the oldest form of malware that can infect a system. These types of viruses have been around since the inception of the personal computer. The modern landscape of computing has given rise to a number of newer and more sophisticated viruses, Trojan horses, and worms that can infiltrate a computer system, opening the user to heightened risks of being victimized by cyber criminals. Individual computer users are not the only targets of these malware programs; computer criminals and hackers now target governmental and corporate computer systems on a regular basis.
In your initial post define the terms computer virus, Trojan horse, and worm. Explain how each malware type functions once installed on a computer or computer system.
Identify at least one computer virus, Trojan horse, or worm in operation today and describe its specific effects on systems once installed.
In addition, you must evaluate the legal issues that arise as officials strive to prevent and detect each of these types of malicious programs. Examine the methods of analyzing malware attacks with regard to determining their source.