In: Computer Science
1. Network security can be defined as the protection of networks and computer system from malicious attacks like execution of viruses, worms, trojans with the intent to destroy the system and its secured features.
2. Computer viruses is malware which stands for malicious software used to disrupt computer operations, gather sensitive information, gain access to private computer systems. They replicates by attaching to hosts and often evade detection by self modification.
3. They replicates by attaching to hosts and often evade detection by self modification. In this way viruses spread over a system.
4. Worm is another type of malware which is a program or algorithm that replicates itself over a computer network. It is common for worms to be noticed only when their uncontrolled replication consumes system resources, slowing or halting other tasks.
5. They spread over computer network. They use parts of an operating system that are automatic and usually invisible to the user.
6. The virus replicates by attaching to hosts whereas worms replicate itself over a computer network.
The virus often evade detection by self-modification, which defeats signature scanners, because each infected file contains a different variant of the virus whereas worms usually perform malicious actions such as using up the resources of the computer and possibly shutting the system down. They use parts of operating systems that are automatic and usually invisible to the user. It is common for worms to be noticed only when their uncontrolled replication consumes system resources, slowing or halting other tasks.
7. Viruses and worms are used to infect the system for seeking profit, or desire to send a political message, to demonstrate that vulnerability exists in software, for sabotage or for cybersecurity issues and evolutionary algorithms. They can gain admin control and steal sensitive data.
Social engineers or hackers or virus writers may use them.
8. Using good antivirus or malicious software removal tools can be an option. Having a Hardware-based firewall and deploy DNS can be a method of prevention. Other than that any third party installation should be checked and system securities should be properly taken care of.