X hits on this document

Powerpoint document

UNDERSTANDING INFORMATION SECURITY - page 6 / 35

86 views

0 shares

0 downloads

0 comments

6 / 35

SALIENT DIFFERENCES

1)  Computer Virus:

Needs a host file

2)  Network Worm:

No host (self-contained)

Copies itself  

Executable

Copies itself

Executable

3)  Trojan Horse:

No host (self-contained)

Does not copy itself

Imposter Program

Document info
Document views86
Page views86
Page last viewedFri Dec 09 20:33:09 UTC 2016
Pages35
Paragraphs350
Words1204

Comments