This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Computer Viruses"

From OWASP
Jump to: navigation, search
(Description)
(Description)
Line 1: Line 1:
 
== Description ==
 
== Description ==
 
A Computer Virus is a small program designed to cause some kind of damage in the infected computer, eitheir deleting data, either capturing information, either by altering the normal operation of the machine.
 
A Computer Virus is a small program designed to cause some kind of damage in the infected computer, eitheir deleting data, either capturing information, either by altering the normal operation of the machine.
 +
 
Like the human virus has different levels of gravity, such as the Ebola virus and the influenza virus, the computer virus range from slightly disturbing to totally destructive. The good news is that a real virus does not spread without human action. We need to send someone a file or send email to it from spreading.
 
Like the human virus has different levels of gravity, such as the Ebola virus and the influenza virus, the computer virus range from slightly disturbing to totally destructive. The good news is that a real virus does not spread without human action. We need to send someone a file or send email to it from spreading.
  

Revision as of 20:47, 11 July 2008

Description

A Computer Virus is a small program designed to cause some kind of damage in the infected computer, eitheir deleting data, either capturing information, either by altering the normal operation of the machine.

Like the human virus has different levels of gravity, such as the Ebola virus and the influenza virus, the computer virus range from slightly disturbing to totally destructive. The good news is that a real virus does not spread without human action. We need to send someone a file or send email to it from spreading.

Risk Factors

TBD

Examples

TBD

Related Attacks

TBD

Related Vulnerabilities

TBD

References

TBD