Here is the synopsis of our sample research paper on Malicious Codes. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
This 6 page paper discusses computer viruses, worms and Trojan horses and the difference between them. Bibliography lists 8 sources.
Page Count:
6 pages (~225 words per page)
File: D0_HVMalCde.rtf
Buy This Term Paper »
 
Unformatted sample text from the term paper:
destroy months of someone elses work, but obviously they exist, and they present a real threat to other users. This paper considers the types of malicious codes that can be
introduced into systems, including worms, viruses and Trojan horses. Discussion The first thing to note is that almost all the references say the same thing, because viruses, Trojan horses and
worms are well understood. That is, there is little here that will break new ground in the field; rather, the sources reinforce each other. That said, what are these malicious
codes? Although many people use the terms worm, virus and Trojan horse interchangeably, they are separate entities, though they can all damage a computer system (Beal, 2006). It is therefore
best to discuss them separately. A computer virus "attaches itself to a program or file so it can spread from one computer to another, leaving infections as it travels" (Beal,
2006). It behaves in much the same was as a human virus, which is where it gets its name; also, like human viruses, computer viruses are different in their severity
(Beal, 2006). Some viruses are "mildly annoying" while others can cause severe damage to hardware, software and files (Beal, 2006). Beal points out that nearly all viruses "are attached to
an executable file, which means the virus may exist on your computer but it cannot infect your computer unless you run or open the malicious program" (Beal, 2006). This means
that a virus cannot spread unless a human performs some sort of action that enables it to spread, such as opening an infected file (Beal, 2006). Most people dont realize
that their computer is infected and so they continue to spread viruses unknowingly, "by sharing infecting files or sending e-mails with viruses as attachments in the e-mail" (Beal, 2006). A
...