Sample Essay on:
Malicious Codes

Here is the synopsis of our sample research paper on Malicious Codes. Have the paper e-mailed to you 24/7/365.

Essay / Research Paper Abstract

This 6 page paper discusses computer viruses, worms and Trojan horses and the difference between them. Bibliography lists 8 sources.

Page Count:

6 pages (~225 words per page)

File: D0_HVMalCde.rtf

Buy This Term Paper »

 

Unformatted sample text from the term paper:

destroy months of someone elses work, but obviously they exist, and they present a real threat to other users. This paper considers the types of malicious codes that can be introduced into systems, including worms, viruses and Trojan horses. Discussion The first thing to note is that almost all the references say the same thing, because viruses, Trojan horses and worms are well understood. That is, there is little here that will break new ground in the field; rather, the sources reinforce each other. That said, what are these malicious codes? Although many people use the terms worm, virus and Trojan horse interchangeably, they are separate entities, though they can all damage a computer system (Beal, 2006). It is therefore best to discuss them separately. A computer virus "attaches itself to a program or file so it can spread from one computer to another, leaving infections as it travels" (Beal, 2006). It behaves in much the same was as a human virus, which is where it gets its name; also, like human viruses, computer viruses are different in their severity (Beal, 2006). Some viruses are "mildly annoying" while others can cause severe damage to hardware, software and files (Beal, 2006). Beal points out that nearly all viruses "are attached to an executable file, which means the virus may exist on your computer but it cannot infect your computer unless you run or open the malicious program" (Beal, 2006). This means that a virus cannot spread unless a human performs some sort of action that enables it to spread, such as opening an infected file (Beal, 2006). Most people dont realize that their computer is infected and so they continue to spread viruses unknowingly, "by sharing infecting files or sending e-mails with viruses as attachments in the e-mail" (Beal, 2006). A ...

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again:

Can't find the perfect research paper? Order a Custom Written Term Paper Now