Viruses, Trojan Horses, and Worms

 Viruses, Trojan Horses, and Worms

Prior to beginning work on this discussion, read Chapter 4 in the text, watch the Technology in 10: Malware, Viruses, Worms, and More (Links to an external site.) video, and review the Cisco What Is the Difference: Viruses, Worms, Trojan Horses, and Bots? (Links to an external site.) article.

Computer viruses are considered to be the oldest form of malware that can infect a system. These types of viruses have been around since the inception of the personal computer. The modern landscape of computing has given rise to a number of newer and more sophisticated viruses, Trojan horses, and worms that can infiltrate a computer system, opening the user to heightened risks of being victimized by cyber criminals. Individual computer users are not the only targets of these malware programs; computer criminals and hackers now target governmental and corporate computer systems on a regular basis.


Required Resources


Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2018). Cybercrime and digital forensics: An introduction (2nd ed.).  Retrieved from

  • Chapter 4: Malware and Automated Computer Attacks
  • Chapter 5: Digital Piracy and Intellectual Property Theft


CISCO. (n.d.). What is the difference: Viruses, worms, trojan horses, and bots?  (Links to an external site.) Retrieved from

  • This online resource, by Cisco Systems, contains detailed explanations of computer viruses, worms, Trojan horses, and bots. It will assist you in the development of this week’s discussion posts.
    Accessibility Statement is not available
    Privacy Policy (Links to an external site.)


Larkin, D. [Dom Larkin]. (2014, June 8). Digital Piracy (Links to an external site.) [Video file]. Retrieved from

IgnorantPCFanboys. (2011, September 22).

Steve Wozniak: Digital piracy (Links to an external site.) [Video file]. Retrieved from

Mr. Ford’s Class. (2014, January 21).

Technology in 10: Malware, Viruses, Worms, and More (Season 1 – Episode 3) (Links to an external site.) [Video file]. Retrieved from

Recommended Resources


Lough, D. L. (2001). A taxonomy of computer attacks with applications to wireless networks (Links to an external site.) (Doctoral dissertation, Virginia Polytechnic Institute and State University). Retrieved from

  • This dissertation examines in detail the variety of attacks that can be levied at computers and provides a taxonomy of such criminal activity. Special attention is given to attacks vie wireless networks.


Hinduja, S. (2003). Trends and patterns among online software pirates (Links to an external site.). Ethics and Information Technology, 5(1), 49-61. Retrieved from

  • The full-text version of this article is available through the ProQuest database in the University of Arizona Global Campus Library. This article provides information on the trends and patterns of software pirates working on a university campus. It may assist you in the development of this week’s activities.


arXter. (2009, January 8). HARDtalk: The music industry – Digital music & piracy (Links to an external site.) [Video file]. Retrieved from

Imperva. (2014, January 30).

Automated hacking tools – Meet the new rock stars in the cyber underground (Links to an external site.) [Video file]. Retrieved from


MSCJ Professional Sources (Links to an external site.). (

  • This resource site will provide assistance in researching additional sources for the assessments within this course.

In your initial post define the terms computer virus, Trojan horse, and worm. Explain how each malware type functions once installed on a computer or computer system. Identify at least one computer virus, Trojan horse, or worm in operation today and describe its specific effects on systems once installed. In addition, you must evaluate the legal issues that arise as officials strive to prevent and detect each of these types of malicious programs. Examine the methods of analyzing malware attacks with regard to determining their source.

Leave a Comment

Your email address will not be published. Required fields are marked *