What is the difference between logic bomb and a worm




















A study of major U. Forty-three percent of the diskettes responsible for introducing a virus into corporate computers had been brought from home. You can catch a virus by launching an infected application or starting up your computer from a disk that has infected system files. Once a virus is in memory, it usually infects any application you run, including network applications if you have write access to network folders or disks. A properly configured network is less susceptible to viruses than a stand-alone computer.

When you interact with another computer, the virus may automatically reproduce itself in the other computer. Once a virus infects a single networked computer, the average time required to infect another workstation in the same network is from 10 to 20 minutes -- meaning a virus can paralyze an entire organization in a few hours. Not all viruses, worms, logic bombs, and Trojan Horses are transmitted through infected software brought in from outside the organization.

Some of the most damaging are implanted by disaffected insiders. For example: A computer programmer at a Fort Worth, Texas, insurance firm was convicted of computer sabotage for planting malicious software code that wiped out , payroll records two days after he was fired.

A computer programmer at defense contractor General Dynamics was arrested for planting a "logic bomb" set to go off several months after he resigned from the company. If the bomb had not been detected by another General Dynamics employee, it would have destroyed irreplaceable data on several defense contracts.

In order to avoid security or system maintenance problems, many organizations require that all software be installed by a system administrator. Some organizations require that any diskette you bring into the building be tested for viruses before being used.

Others do not. Consult your system administrator to learn the correct procedures in your organization. Be sure you know how your virus detection software works. If it indicates your system has a virus problem, report it immediately to your system administrator and then to the person you believe may have passed the virus to you. It is important to remain calm. There are many virus hoaxes as well as real viruses, and a virus scare can cause as much delay and confusion as an actual virus outbreak.

Before announcing the virus widely, make sure you verify its presence using a virus detection tool, if possible, with the assistance of technically competent personnel. If you have a stand-alone computer or your organization has few controls on installing new programs or bringing in diskettes, the following procedures will help lower the risk of infection or amount of damage if the worst does happen.

Every change needs to be reviewed by as many people as possible to reduce the chance of someone slipping in a malicious bit of code. Copado accelerates Salesforce deployments, simplifies the release process, increases developer productivity and maximizes return on cloud investments. Toggle menubar DevOps Resource Hub.

Open search box. Search sitewide Close search box. Originally published by New Context. What Is a Logic Bomb? Frequently Asked Questions Regarding Logic Bombs Beyond this basic definition of logic bombs, there are some key characteristics to help you identify this type of attack.

Is a Logic Bomb Malware? However, a good anti-virus system installed on your system is essential and will usually detect most viruses. When a virus is detected, the software will attempt to remove the virus. This is called cleaning or disinfecting. It sometimes happens that the system can detect the virus but not get rid of it. In this case, you will usually be given the option of deleting or quarantining the infected file. When a file is quarantined, it is made unusable and so unable to spread the virus.

A future update of the software may be able to remove the virus. If it can the quarantine is removed. A list of free anti-virus software available for download is available at download. Jump to: navigation , search.

Category : CCNC. Navigation menu Personal tools Log in Request account. Namespaces Page Discussion. Views Read View source View history.



0コメント

  • 1000 / 1000