X hits on this document

Powerpoint document

UNDERSTANDING INFORMATION SECURITY - page 6 / 35

104 views

0 shares

0 downloads

0 comments

6 / 35

SALIENT DIFFERENCES

1)  Computer Virus:

Needs a host file

2)  Network Worm:

No host (self-contained)

Copies itself  

Executable

Copies itself

Executable

3)  Trojan Horse:

No host (self-contained)

Does not copy itself

Imposter Program

Document info
Document views104
Page views104
Page last viewedWed Jan 18 16:04:56 UTC 2017
Pages35
Paragraphs350
Words1204

Comments