- Read the article titled “What Is the Difference: Viruses, Worms, Trojans, and Bots?”, located at http://www.cisco.com/web/about/security/intelligence/virus-worm-diffs.html, or research the Internet or Strayer library for articles on recent examples (i.e., within the last two  years) of viruses, denial-of-service attacks, and other blended threats that have adversely affected businesses or individual computer users. Be prepared to discuss.
- Read the article titled “Program Security”, located at http://www.informit.com/articles/article.aspx?p=31782&seqNum=3. Be prepared to discuss.
- From the first e-Activity, explain the key differences between viruses and other malicious codes. Identify at least three (3) different types of viruses, and describe the main differences between each one. Next, explain both the potential threat posed by viruses and other malicious codes and their main effects on computers and productivity.
- From the second e-Activity, discuss the fundamental lesson(s) that we can learn from the attacks of viruses and other malicious codes. Speculate on the main steps that both individuals and businesses can take in order to protect themselves from attacks that may occur in the future.
Please respond to the following statement:
The main difference between viruses and other malicious codes is the fact that viruses attach themselves to programs and spreads copies of itself. Other malicious code modestly trigger other codes to replicates other codes and allows other codes to enter. Three types of viruses can be viruses that surround a program in which they will not attach but, will surround a program until they can enter. Another type of virus is integrated viruses and replacements in which they will take the place of another virus. The last type of virus is document viruses that will enter your computer when a document is already corrupted enter your computer.
Fundamental lessons that can remain are to use popular sites and applications that are approved by the government, organize your research before using a site or application and use security on your computer.