You are on page 1of 1

PERFORMANCE

IN
TASK
COMPUTER
Submi
tted
4
Concept Map of Computer worm vs Computer

by:
COMP
Discharges
SPREADS ONLY COMPRISES OF
ALYSS document
WHEN
already
THIS
that MALICIOUS
ONE INVITES
has
PROGRAM CODES THAT

A A.
ONTO A SYSTEM.
worm macroIT WHEN Exists
IT IS
Replicates itself CAN SPREAD TRIGGERED
within IT
INSTANTLY IF YOU OFTENother
RESULT IN
easily from one
JIZMU
system to another
DOWNLOAD Needs THEFT
RUNNING FILES
without any aidFROM
an
infected swarm
of INTERNET
OR LOSS
OF DATA
OR

NDO
a host file/ humanOPEN EMAIL spread
action.
file
ATTACHMENT.
to
properly.
IMPOSTORS-
APPEARS
Malicious program
USEFUL BUT that can cause
DAMAGES
SYSTEM, damage to your
REQUIRES computer
HUMAN
ACTION TO
RUN, DO NOT

COMP SELF-
REPLICATE

You might also like