Which of the following is a malicious program that self copies and self replicates?

What is a Computer Virus or a Computer Worm?

An important distinction between computer viruses and worms is that viruses require an active host program or an already-infected and active operating system in order for viruses to run, cause damage and infect other executable files or documents, while worms are stand-alone malicious programs that can self-replicate and propagate via computer networks, without human help.

Viruses are typically attached to an executable file or a word document. They often spread via P2P file sharing, infected websites, and email attachment downloads. Once a virus finds its way onto your system, it will remain dormant until the infected host file or program is activated, which in turn makes the virus active enabling it to run and replicate on your system.

Worms, on the other hand, don't need a host program in order for them to run, self-replicate and propagate. Once a worm has made its way onto your system, usually via a network connection or as a downloaded file, it can then make multiple copies of itself and spread via the network or internet connection infecting any inadequately-protected computers and servers on the network. Because each subsequent copy of a network worm can also self-replicate, infections can spread very rapidly via the internet and computer networks.

How Do Computer Viruses Spread?

The Viruses and Worms subclass of malicious software programs includes the following:

  • Email-Worm
  • IM-Worm
  • IRC-Worm
  • Net-Worm
  • P2P-Worm
  • Virus

Computer Worms

Most known computer worms are spread in one of the following ways:

  • Files sent as email attachments
  • Via a link to a web or FTP resource
  • Via a link sent in an ICQ or IRC message
  • Via P2P (peer-to-peer) file sharing networks
  • Some worms are spread as network packets. These directly penetrate the computer memory, and the worm code is then activated.

Computer worms can exploit network configuration errors (for example, to copy themselves onto a fully accessible disk) or exploit loopholes in operating system and application security. Many worms will use more than one method in order to spread copies via networks.

Viruses

Viruses can be divided according to the method that they use to infect a computer:

  • File viruses
  • Boot sector viruses
  • Macro viruses
  • Script viruses

Any program within this subclass of malware can also have additional Trojan functions.

Retrieved 11-14-2016, from https://usa.kaspersky.com/internet-security-center/threats/computer-viruses-vs-worms#.WCoxdWorK3c. 

Macro Virus: These type of virus infects word, excel, PowerPoint, access and other data files. Once infected repairing of these files is very much difficult.

Master boot record files: MBR viruses are memory-resident viruses and copy itself to the first sector of a storage device which is used for partition tables or OS loading programs .A MBR virus will infect this particular area of Storage device instead of normal files. The easiest way to remove a MBR virus is to clean the MBR area,

Boot sector virus: Boot sector virus infects the boot sector of a HDD or FDD. These are also memory resident in nature. As soon as the computer starts it gets infected from the boot sector.  Cleaning this type of virus is very difficult.

Multipartite virus: A hybrid of Boot and Program/file viruses. They infect program files and when the infected program is executed, these viruses infect the boot record. When you boot the computer next time the virus from the boot record loads in memory and then start infecting other program files on disk

Polymorphic viruses: A virus that can encrypt its code in different ways so that it appears differently in each infection. These viruses are more difficult to detect.

Stealth viruses: These types of viruses use different kind of techniques to avoid detection. They either redirect the disk head to read another sector instead of the one in which they reside or they may alter the reading of the infected file’s size shown in the directory listing. For example, the Whale virus adds 9216 bytes to an infected file; then the virus subtracts the same number of bytes (9216) from the size given in the directory.

Arthur 11 Oct, 2022 2414 Views

Which of the following is a malicious program that self copies and self replicates?
Which of the following is a malicious program that self copies and self replicates?
Which of the following is a malicious program that self copies and self replicates?
Which of the following is a malicious program that self copies and self replicates?
Which of the following is a malicious program that self copies and self replicates?
(4 votes, average: 4.00 out of 5)

Which of the following is a malicious program that self copies and self replicates?
Loading...

The words “Malicious Software” coin the word “Malware” and the meaning remains the same. Malicious Software refers to any malicious program that causes harm to a computer system or network. Malicious Malware Software attacks a computer or network in the form of viruses, worms, trojans, spyware, adware or rootkits.

Which of the following is a malicious program that self copies and self replicates?

Their mission is often targeted at accomplishing unlawful tasks such as robbing protected data, deleting confidential documents or add software without the user consent.

Different Types Of Malicious Software

Computer Virus

A computer virus is a malicious software which self-replicates and attaches itself to other files/programs. It is capable of executing secretly when the host program/file is activated. The different types of Computer virus are Memory-Resident Virus, Program File Virus, Boot Sector Virus, Stealth Virus, Macro Virus, and Email Virus.

Worms

A worm is a malicious software which similar to that of a computer virus is a self-replicating program, however, in the case of worms, it automatically executes itself. Worms spread over a network and are capable of launching a cumbersome and destructive attack within a short period.

Trojan Horses

Unlike a computer virus or a worm – the trojan horse is a non-replicating program that appears legitimate. After gaining the trust, it secretly performs malicious and illicit activities when executed. Hackers make use of trojan horses to steal a user’s password information, destroy data or programs on the hard disk. It is hard to detect!

Spyware/Adware

Spyware secretly records information about a user and forwards it to third parties. The information gathered may cover files accessed on the computer, a user’s online activities or even user’s keystrokes.

Adware as the name interprets displays advertising banners while a program is running. Adware can also work like spyware, it is deployed to gather confidential information. Basically, to spy on and gather information from a victim’s computer.

Rootkit

A rootkit is a malicious software that alters the regular functionality of an OS on a computer in a stealthy manner. The altering helps the hacker to take full control of the system and the hacker acts as the system administrator on the victim’s system. Almost all the rootkits are designed to hide their existence.

Malicious Software History

Even before the internet became widespread, malicious software (virus) was infected on personal computers with the executable boot sectors of floppy disks. Initially, the computer viruses were written for the Apple II and Macintosh devices. After the IBM PC and MS-DOS system became more widespread they were also targeted in the similar fashion.

The first worms originated on multitasking Unix systems, they were the first network-borne infectious programs too. SunOS and VAX BSD systems were infected by the first well-known worm of the time called the Internet Worm of 1988. Ever since the advent of Microsoft Windows platform in the 1990s, the infectious codes were written in the macro language of Microsoft Word and similar programs.

Methods Of Protection Against Malicious Software

Malicious Software is definitely a security threat for corporate users and individuals, thereby detecting and fighting malware remains on top of the agenda for many firms. Since the time BYOD culture started to flourish, Endpoint Security and Endpoint Protection have become the topics of discussion in many IT conference rooms. Many corporates today try to implement the best Endpoint Security or Endpoint Protection software to steer clear of the dangers.

Remember, if it is an individual system, it is essential to have an antivirus installed and if you already have one in place see to that it is updated at regular intervals. This approach will help you to remain safe during new breakouts. Xcitium’s Free Antivirus, Endpoint Security, Endpoint Protection Solutions are your best option for detecting and fighting malicious software. For more details visit our official page!

See Also:

Best Endpoint Detection & Response

What is EDR?

What is Endpoint Protection?

What is Trojan Horse?

Are malicious programs that self copy and self

What is a worm? Worms are programs that replicate themselves from system to system without the use of a host file. This is in contrast to viruses, which requires the spreading of an infected host file.

What type of malware self replicates?

A computer worm is a self-replicating malware program whose primary purpose is to infect other computers by duplicating itself while remaining active on infected systems.

Is Trojan self

Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. Trojans also open a backdoor entry to your computer which gives malicious users/programs access to your system, allowing confidential and personal information to be theft.