blanketglossary

Computer worm

Definition

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers. When these new worm-invaded computers are controlled, the worm will continue to scan and infect other computers using these computers as hosts, and this behavior will continue. Computer worms use recursive methods to copy themselves without host programs and distribute themselves based on exploiting the advantages of exponential growth, thus controlling and infecting more and more computers in a short time. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

Related concepts

ACL (software)ARPANETAccess Control ListActiveXAdvanced persistent threatAdwareAnomaly detectionAnti-keyloggerAntispywareAntivirus softwareApplication securityArbitrary code executionAuthenticationAuthorizationAutomotive securityBBN TechnologiesBackdoor (computing)Bandwidth (computing)Bill GatesBlaster (computer worm)Blaster wormBlueKeep (security vulnerability)BotnetBotnetsBrowser Helper ObjectBrowser securityCEOCERT Coordination CenterClickjackingCode Red (computer worm)Code Shikara (Worm)Code injectionComputer Fraud and Abuse ActComputer access controlComputer and network surveillanceComputer fraudComputer networkComputer programComputer securityComputer security softwareComputer virusConfickerConficker wormContent-addressable memoryCopy protectionCornell UniversityCreeper and ReaperCrimewareCross-site leaksCross-site scriptingCryptojackingCybercrimeCybergeddonCybersex traffickingCyberterrorismCyberwarfareDOM clobberingDaemon (computing)Data-centric securityData breachData loss prevention softwareData maskingData scrapingData theftDefensive computingDenial-of-service attackDialerDigital rights managementDistributed computingDrive-by downloadE-mail spamEavesdroppingElectronic warfareEmailEmail fraudEmail spamEmail spoofingEncryptionEndpoint detection and responseEndpoint protectionEthernetExploit (computer security)ExploreZipExponential growthFather Christmas (computer worm)Firewall (computing)Firewall (networking)FleecewareFork bombForm grabbingGitHubHTMLHacktivismHardware TrojanHardware backdoorHex dumpHistory sniffingHoneypot (computing)Host-based intrusion detection systemILOVEYOUInformation risk managementInformation securityInformation security managementInformation warfareInfostealerInsecure direct object referenceInternet Engineering Task ForceInternet botInternet securityIntrusion detection systemJohn Brunner (novelist)John ShochKeystroke loggingLinux malwareList of HyperCard virusesList of computer wormsLogic bombMacOS malwareMacro virusMalwareMan-in-the-browserMan-in-the-middle attackMicrosoftMicrosoft WindowsMisuse caseMobile malwareMobile securityMorris wormMulti-factor authenticationMydoomNachi wormNetwork securityNetwork switchNimdaNullrouteOSI modelObfuscation (software)Palm OS virusesPatch TuesdayPayload (computing)Payload (software)PhishingPolymorphic enginePrivacy-invasive softwarePrivilege escalationRansomwareRay TomlinsonReaper (program)Recursion (computer science)Remote access trojanRequest for CommentsRobert Tappan MorrisRogue security softwareRoku OSRootkitRouter (computing)Runtime application self-protectionSIMATIC WinCCSQL injectionSantyScarewareSecure by designSecure codingSecurity-focused operating systemSecurity information and event managementSelf-replicating machineShared folderShellcodeSite isolationSocial engineering (security)Software bugSpammingSpanning treeSpywareStuxnetTCP WrapperTechnical support scamThe GuardianThe Shockwave RiderThreat (computer)Time bomb (software)Timeline of computer viruses and wormsTrojan horse (computing)VBScriptVoice phishingVulnerability (computer security)Vulnerability (computing)WannaCryWeb shellWeb threatWelchiaWindowsWiper (malware)Worm (disambiguation)Worm memory testWrite once read manyXSS wormXerox AltoXerox PARCZero-day attackZip bombZombie (computer science)Zombie (computing)Zombie computers

2 concepts already in your glossary