Viruses, Trojan Horses, and Worms

 Viruses, Trojan Horses, and Worms

Prior to beginning work on this discussion, read Chapter 4 in the text, watch the video, and review the Cisco article.

Computer viruses are considered to be the oldest form of malware that can infect a system. These types of viruses have been around since the inception of the personal computer. The modern landscape of computing has given rise to a number of newer and more sophisticated viruses, Trojan horses, and worms that can infiltrate a computer system, opening the user to heightened risks of being victimized by cyber criminals. Individual computer users are not the only targets of these malware programs; computer criminals and hackers now target governmental and corporate computer systems on a regular basis.


Required Resources


Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2018).  (2nd ed.).  Retrieved from https://www.vitalsource.com/

  • Chapter 4: Malware and Automated Computer Attacks
  • Chapter 5: Digital Piracy and Intellectual Property Theft


CISCO. (n.d.).  Retrieved from http://www.cisco.com/web/about/security/intelligence/virus-worm-diffs.html

  • This online resource, by Cisco Systems, contains detailed explanations of computer viruses, worms, Trojan horses, and bots. It will assist you in the development of this weeks discussion posts.
    Accessibility Statement is not available


Larkin, D. [Dom Larkin]. (2014, June 8). [Video file]. Retrieved from https://www.youtube.com/watch?v=RMaXj1Kjis8

  • This video is a screencast presentation of the many aspects of digital piracy. The video will assist you in the development of this weeks written assignment.

IgnorantPCFanboys. (2011, September 22).

[Video file]. Retrieved from https://www.youtube.com/watch?v=jJRSjFqu-8Q

  • This video is an interview with Steve Wozniak on the early culture surrounding digital piracy. The video will assist you in the development of this weeks written assignment.

Mr. Fords Class. (2014, January 21).

[Video file]. Retrieved from https://www.youtube.com/watch?v=29LOaxPwPPU

  • This video is a lecture style analysis of malware, viruses, and worms. It will assist you in the development of this weeks discussion post.

Recommended Resources


Lough, D. L. (2001). (Doctoral dissertation, Virginia Polytechnic Institute and State University). Retrieved from https://theses.lib.vt.edu/theses/available/etd-04252001-234145/unrestricted/lough.dissertation.pdf

  • This dissertation examines in detail the variety of attacks that can be levied at computers and provides a taxonomy of such criminal activity. Special attention is given to attacks vie wireless networks.


Hinduja, S. (2003). . Ethics and Information Technology, 5(1), 49-61. Retrieved from http://www.springer.com/computer/swe/journal/10676

  • The full-text version of this article is available through the ProQuest database in the University of Arizona Global Campus Library. This article provides information on the trends and patterns of software pirates working on a university campus. It may assist you in the development of this weeks activities.


arXter. (2009, January 8). [Video file]. Retrieved from https://www.youtube.com/watch?v=rnpntZLnF7w

  • This video is a British news style discussion of global digital piracy and the variety of methods governments can utilized to help combat digital piracy.

Imperva. (2014, January 30).

[Video file]. Retrieved from https://www.youtube.com/watch?v=TE21JrVWlHU

  • This video is a webinar discussing automated computer hacking, firewall applications, and various methods that can be utilized to protect data.


. (http://ashford-mscj.weebly.com)

  • This resource site will provide assistance in researching additional sources for the assessments within this course.

In your initial post define the terms computer virus, Trojan horse, and worm. Explain how each malware type functions once installed on a computer or computer system. Identify at least one computer virus, Trojan horse, or worm in operation today and describe its specific effects on systems once installed. In addition, you must evaluate the legal issues that arise as officials strive to prevent and detect each of these types of malicious programs. Examine the methods of analyzing malware attacks with regard to determining their source.


You can place an order similar to this with us. You are assured of an authentic custom paper delivered within the given deadline besides our 24/7 customer support all through.


Latest completed orders:

# topic title discipline academic level pages delivered
Writer's choice
1 hour 32 min
Wise Approach to
2 hours 19 min
1980's and 1990
2 hours 20 min
pick the best topic
2 hours 27 min
finance for leisure
2 hours 36 min