0% found this document useful (0 votes)
44 views3 pages

Haramaya University: Institute of Technology

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 3

HARAMAYA UNIVERSITY

INSTITUTE OF TECHNOLOGY

School Of Electrical and computer engineering

Computer Stream

worm

name id
Kaleb Adamu 1304/09

Submitted to MR wehib.A
DATE:4/14/2021
WORMS Definition
A computer worm is a malicious piece of software that replicates itself from one computer to another with the goal of
overtaking the entire network of computers . If a worm is indeed malicious and not just used to breach the system security,
the code designed to carry out the attack is referred to as the payload. Payloads are usually created to change or delete files
on a target network, extract personal data from them, or encrypt them and seek a ransom from the victim.
Types of Computer Worms
1. Internet Worms
These computer worms target popular websites with insufficient security. When they manage to infect the
site, internet worms can replicate themselves onto any computer being used to access the website in
question.
2. Email Worms
Email worms are most often distributed via compromised email attachments. They usually have double
extensions (for example, .mp4.exe or .avi.exe) so that the recipient would think that they are media files and
not malicious computer programs. When the victims click on the attachment, copies of the same infected file
will automatically be sent to addresses from their contacts list.
3. Instant Messaging Worms
Instant messaging worms are exactly the same as email worms, the only difference is , they are masked as
attachments or clickable links to websites. They are often accompanied by short messages like “LOL” or
“You have to see this!” to trick the victim into thinking that their friend is sending them a funny video to
look at.
4. File-Sharing Worms
these programs are disguised as media files with dual extensions.
When the victim opens the downloaded file they will download the worm to their computer. Even if it
seems that users have downloaded an actual playable media file, an executable malicious file could be
hidden in the folder and discreetly installed when the media file is first opened.
5. IRC Worms
Internet Relay Chat (IRC) is a messaging app that is mostly outdated nowadays but was all the rage at the
turn of the century. Same as with today’s instant messaging platforms, computer worms were distributed via
messages containing links and attachments. The latter was less effective due to an extra layer of protection
that prompted users to accept incoming files before any transfer could take place.
Harmful Effects of Computer Worms
worm can send email using an address book stored on the computer and it can inconspicuously open TCP
ports to create holes in your security so they can bypass your firewall and infect any other computer that
your computer communicates with.phishing emails while very few also try to change the system settings .it
also cause harm to their host networks by consuming bandwidth and overloading web servers.Computer
worms can also contain “payloads” that damage host computers. . Payloads are commonly designed to steal
data or delete files. Some payloads even create backdoors in host computers that allow them to be controlled
by other computers.
signature of worm
 Freezing/crashing , Slow computer performance
 Irregular web browser performance , Programs opening and running automatically
 Missing/modified files
 Appearance of strange/unintended desktop files or icons
 Operating system errors and system error messages
 Emails sent to contacts without the user’s knowledge

How to control Computer Worms


Security software is crucial for preventing computer worms. Firewalls will filter network traffic for
suspicious or unauthorized files and programs. Antivirus programs can scan for and delete known malware
files. As well, traffic monitoring can detect suspicious spikes in network traffic. Email scanning is crucial,
since many worms gain access through fake emails so A good email filter can detect if these links or files
are present.
How to prevent,detect and control computer worms
Never open strange email attachments,Don’t click weird links , Don’t use P2P programs ,Use current
software ,Use strong unique passwords ,Keep the computers’ operating system and software up-to-date
,Avoid opening emails that you don’t recognize or expect, as many computer worms spread via
email.Refrain from opening attachments and clicking on links from untrusted/unfamiliar sources.Run a
firewall and antivirus software to be further protected from computer worms.

You might also like