What does the computer term worm mean

what does the computer term worm mean

Worm (Computer Worm)

A computer worm is a type of malware that spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage. How do computer worms work? Worms can be transmitted via software vulnerabilities. Sep 13,  · A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining active on infected systems. A computer worm is self-replicating malware that duplicates itself to spread to uninfected computers. Worms often use parts of an operating system that are automatic and invisible to the user.

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

Many worms that have been created are designed only to spread, and do th attempt to change the systems they pass through. However, as the Morris worm and Mydoom showed, even these "payload free" worms can cause major disruption by increasing network traffic and other unintended effects. A "payload" is code in the worm designed to do more than spread the worm—it might delete files on a host system, doea files in a cryptoviral extortion attack, or send documents via e-mail.

A very common payload for temr is to install a backdoor in the infected computer to allow the creation of a "zombie" computer under teerm of the worm author. Networks of such machines are often referred to as botnets and are very commonly used by spam senders for sending junk email or to cloak their website's address. Spammers are therefore thought to be a source of funding for wofm creation of such worms, and the worm writers have been caught selling lists of IP addresses of infected machines.

Others try to blackmail companies with threatened DoS attacks. The numerical value of computer worm in Pythagorean Numerology is: 9.

We're doing our compurer to make sure our content is useful, accurate and safe. If by any chance you spot an inappropriate comment while navigating through our website please use this form to let us know, and we'll take care of it shortly. Forgot your password? Retrieve it. If by any how to draw sports cars you spot an inappropriate image within your search results please use this form to let us know, and we'll take care of cmputer shortly.

Term » Definition. Word wnat Definition. Freebase 2. How to pronounce computer worm? Alex US English. Daniel British. Karen Australian. Veena Indian. How to say computer worm in sign language? Numerology Chaldean Numerology The numerical value of computer worm in Chaldean Numerology tdrm 4 Pythagorean Numerology The numerical value of computer worm in Pythagorean Numerology is: 9. Select another language:. Please enter your email address: Subscribe.

Discuss these computer worm definitions with the community: 0 Comments. Notify me of new comments via email. Cancel Report. Create a new account. Log In. Powered by CITE. Are we missing a good definition for computer worm? Don't keep it to yourself Submit Definition.

The ASL fingerspelling provided here is most commonly used for proper names of people and places; it is also used in some languages for concepts for which no sign is available at that moment. There are obviously specific signs for many words available in sign language that are more appropriate for daily usage. Browse Definitions. Get instant compuetr for how to set up an online store step by step word that hits you anywhere on the web!

Two clicks install ». Quiz Te you a words master? Thanks for what does the computer term worm mean vote! We truly appreciate your support.

Where would I encounter worms in my daily work?

A computer worm is a malicious program that reproduces itself as it spreads to as many computers as possible over networks. This makes the computer worm particularly dangerous for companies. But what exactly does a computer worm do, how is it recognized and how can the problem be resolved? Worm (Computer Worm) A worm is a malicious program (malware) that propagates itself and duplicates itself. A well- known example is the email worm that circulated in the year , with the subject line, ILOVEYOU, and deleted numerous files. What does the term “worm” mean in detail? A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program.

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It will use this machine as a host to scan and infect other computers. When these new worm-invaded computers are controlled, the worm will continue to scan and infect other computers using these computers as hosts, and this behaviour will continue. Many worms are designed only to spread, and do not attempt to change the systems they pass through.

However, as the Morris worm and Mydoom showed, even these "payload-free" worms can cause major disruption by increasing network traffic and other unintended effects. In the novel, Nichlas Haflinger designs and sets off a data-gathering worm in an act of revenge against the powerful men who run a national electronic information web that induces mass conformity.

There's never been a worm with that tough a head or that long a tail! The first ever computer worm was devised to be an anti-virus software. On November 2, , Robert Tappan Morris , a Cornell University computer science graduate student, unleashed what became known as the Morris worm , disrupting many computers then on the Internet, guessed at the time to be one tenth of all those connected. Computer viruses generally require a host program. When the program runs, the written virus program is executed first, causing infection and damage.

A worm does not need a host program, as it is an independent program or code chunk. Therefore, it is not restricted by the host program , but can run independently and actively carry out attacks.

Exploit attacks. Because a worm is not limited by the host program, worms can take advantage of various operating system vulnerabilities to carry out active attacks. For example, the " Nimda " virus exploits vulnerabilities to attack.

When a user accesses a webpage containing a virus, the virus automatically resides in memory and waits to be triggered. There are also some worms that are combined with backdoor programs or Trojan horses , such as " Code Red ". Worms are more infectious than traditional viruses. They not only infect local computers, but also all servers and clients on the network based on the local computer. Worms can easily spread through shared folders , e-mails , malicious web pages, and servers with a large number of vulnerabilities in the network.

Any code designed to do more than spread the worm is typically referred to as the " payload ". Typical malicious payloads might delete files on a host system e. Some worms may install a backdoor. This allows the computer to be remotely controlled by the worm author as a " zombie ". Networks of such machines are often referred to as botnets and are very commonly used for a range of malicious purposes, including sending spam or performing DoS attacks.

Some special worms attack industrial systems in a targeted manner. Stuxnet was primarily transmitted through LANs and infected thumb-drives, as its targets were never connected to untrusted networks, like the internet. This virus can destroy the core production control computer software used by chemical, power generation and power transmission companies in various countries around the world - in Stuxnet's case, Iran, Indonesia and India were hardest hit - it was used to "issue orders" to other equipment in the factory, and to hide those commands from being detected.

Although these systems operate independently from the network, if the operator inserts a virus-infected disk into the system's USB interface, the virus will be able to gain control of the system without any other operational requirements or prompts. Worms spread by exploiting vulnerabilities in operating systems.

Vendors with security problems supply regular security updates [20] see " Patch Tuesday " , and if these are installed to a machine, then the majority of worms are unable to spread to it.

If a vulnerability is disclosed before the security patch released by the vendor, a zero-day attack is possible. Users need to be wary of opening unexpected email, [21] [22] and should not run attached files or programs, or visit web sites that are linked to such emails. However, as with the ILOVEYOU worm, and with the increased growth and efficiency of phishing attacks, it remains possible to trick the end-user into running malicious code.

Anti-virus and anti-spyware software are helpful, but must be kept up-to-date with new pattern files at least every few days. The use of a firewall is also recommended.

Users can minimize the threat posed by worms by keeping their computers' operating system and other software up to date, avoiding opening unrecognized or unexpected emails and running firewall and antivirus software. Infections can sometimes be detected by their behavior - typically scanning the Internet randomly, looking for vulnerable hosts to infect.

A helpful worm or anti-worm is a worm designed to do something that its author feels is helpful, though not necessarily with the permission of the executing computer's owner. Beginning with the first research into worms at Xerox PARC , there have been attempts to create useful worms.

Those worms allowed John Shoch and Jon Hupp to test the Ethernet principles on their network of Xerox Alto computers [ citation needed ]. Similarly, the Nachi family of worms tried to download and install patches from Microsoft's website to fix vulnerabilities in the host system by exploiting those same vulnerabilities.

Regardless of their payload or their writers' intentions, security experts regard all worms as malware. One study proposed the first computer worm that operates on the second layer of the OSI model Data link Layer , utilizing topology information such as Content-addressable memory CAM tables and Spanning Tree information stored in switches to propagate and probe for vulnerable nodes until the enterprise network is covered. Anti-worms have been used to combat the effects of the Code Red , [29] Blaster , and Santy worms.

Welchia is an example of a helpful worm. Welchia automatically reboots the computers it infects after installing the updates. One of these updates was the patch that fixed the exploit. From Wikipedia, the free encyclopedia. Standalone malware computer program that replicates itself in order to spread to other computers. This article is about coding of a worm. For the data storage device, see Write once read many. For other uses, see worm disambiguation. Not to be confused with computer virus.

Retrieved 9 September Bibcode : PLoSO.. ISSN PMC PMID ISSN X. The Shockwave Rider. New York: Ballantine Books. ISBN Archived from the original on Retrieved Cases and Materials on Criminal Law.

Worm: What's the Difference? OCLC S2CID The Seattle Times. Archived from the original on August 26, Retrieved May 18, BBC News. February 23, July Security Studies. Paris, France: Atlantis Press. Retrieved July 5, December 18, Retrieved 9 June Malware topics. Comparison of computer viruses Computer virus Computer worm List of computer worms Timeline of computer viruses and worms.

Anti-keylogger Antivirus software Browser security Data loss prevention software Defensive computing Firewall Internet security Intrusion detection system Mobile security Network security. Computer and network surveillance Honeypot Operation: Bot Roast. Categories : Computer worms Types of malware Security breaches. Hidden categories: CS1 errors: URL CS1 maint: discouraged parameter Articles with short description Short description matches Wikidata Wikipedia indefinitely move-protected pages All articles with unsourced statements Articles with unsourced statements from March All articles with dead external links Articles with dead external links from August Articles with permanently dead external links Wikipedia articles with GND identifiers Wikipedia articles with MA identifiers.

Namespaces Article Talk. Views Read Edit View history. Help Learn to edit Community portal Recent changes Upload file. Download as PDF Printable version. Wikimedia Commons. Anomaly detection Computer access control Application security Antivirus software Computer security software Secure coding Secure by default Secure by design Misuse case Security-focused operating system Authentication Multi-factor authentication Authorization Data-centric security Code obfuscation Encryption Firewall Intrusion detection system Host-based intrusion detection system HIDS Security information and event management Mobile secure gateway Runtime application self-protection Web application security.

GND : MA :

2 Replies to “What does the computer term worm mean”

Add a comment

Your email will not be published. Required fields are marked*