Virus (computers): Difference between revisions
imported>Howard C. Berkowitz (New page: {{subpages}} <!-- Text is transcluded from the BASEPAGENAME/Definition subpage--> In the context of computer security, a '''virus''' is a piece of software that has the general characteris...) |
imported>Howard C. Berkowitz No edit summary |
||
Line 3: | Line 3: | ||
In the context of computer security, a '''virus''' is a piece of software that has the general characteristics that the computer user is unaware of its existence, it has been installed without permission, and is an unauthorized consumer of resources. Qualifying the software as "unauthorized" excludes such things as remotely installed maintenance updates, since there is an implicit authorization, by the computer owner, to allow such updates to install and confuse resources. | In the context of computer security, a '''virus''' is a piece of software that has the general characteristics that the computer user is unaware of its existence, it has been installed without permission, and is an unauthorized consumer of resources. Qualifying the software as "unauthorized" excludes such things as remotely installed maintenance updates, since there is an implicit authorization, by the computer owner, to allow such updates to install and confuse resources. | ||
A virus will propagate after some action is taken to "infect" resources in the computer. This typically requires the execution of some other program, which is either a legitimate program that has had virus code inserted into it, or a program that the user has been tricked into activating (e.g., [trojan (computers)]]). Viruses, as opposed to [[worm (computers)|worms]], do not have the capacity to enter a computer and immediately begin to spread to other computers. Much like a biological virus can only exist inside a living cell, a computer virus only can exist inside a separately established program. | A virus will propagate after some action is taken to "infect" resources in the computer. This typically requires the execution of some other program, which is either a legitimate program that has had virus code inserted into it, or a program that the user has been tricked into activating (e.g., [[trojan (computers)]]). Viruses, as opposed to [[worm (computers)|worms]], do not have the capacity to enter a computer and immediately begin to spread to other computers. Much like a biological virus can only exist inside a living cell, a computer virus only can exist inside a separately established program. | ||
Viruses may only replicate inside the computer, altering and consuming resources, or may insert themselves into executable software distributed by the computer, such as a mail attachment containing a [[macro]], [[HTML]], or [[Postscript]]. | Viruses may only replicate inside the computer, altering and consuming resources, or may insert themselves into executable software distributed by the computer, such as a mail attachment containing a [[macro]], [[HTML]], or [[Postscript]]. |
Revision as of 08:25, 7 February 2009
In the context of computer security, a virus is a piece of software that has the general characteristics that the computer user is unaware of its existence, it has been installed without permission, and is an unauthorized consumer of resources. Qualifying the software as "unauthorized" excludes such things as remotely installed maintenance updates, since there is an implicit authorization, by the computer owner, to allow such updates to install and confuse resources.
A virus will propagate after some action is taken to "infect" resources in the computer. This typically requires the execution of some other program, which is either a legitimate program that has had virus code inserted into it, or a program that the user has been tricked into activating (e.g., trojan (computers)). Viruses, as opposed to worms, do not have the capacity to enter a computer and immediately begin to spread to other computers. Much like a biological virus can only exist inside a living cell, a computer virus only can exist inside a separately established program.
Viruses may only replicate inside the computer, altering and consuming resources, or may insert themselves into executable software distributed by the computer, such as a mail attachment containing a macro, HTML, or Postscript.