You are on page 1of 18

Difference between Worms and Virus

 Last Updated : 07 Oct, 2021


1. Worms : 
Worms are similar to a virus but it does not modify the program. It replicates itself
more and more to cause slow down the computer system. Worms can be controlled by
remote. The main objective of worms is to eat the system resources. 
2. Virus : 
A virus is a malicious executable code attached to another executable file that can be
harmless or can modify or delete data. When the computer program runs attached with
a virus it performs some action such as deleting a file from the computer system.
Viruses can’t be controlled by remote. 
Difference between Worms and Virus : 
 
S.No.WORMS VIRUS
A Virus is a malicious executable code
attached to another executable file
A Worm is a form of malware that which can be harmless or can modify or
replicates itself and can spread to delete data. 
1. different computers via Network.  
The main objective of worms is to eat The main objective of viruses is to
2. the system resources. modify the information.
It doesn’t need a host to replicate from It requires a host is needed for
3. one computer to another. spreading.
4. It is less harmful as compared. It is more harmful.
Worms can be detected and removed Antivirus software is used for
5. by the Antivirus and firewall. protection against viruses.
6. Worms can be controlled by remote. Viruses can’t be controlled by remote.
Worms are executed via weaknesses in Viruses are executed via executable
7. the system. files.
Internet worms, Instant messaging Boot sector virus, Direct Action virus,
worms, Email worms, File sharing Polymorphic virus, Macro virus,
worms, Internet relay chat (IRC) worms Overwrite virus, File Infector virus are
8. are different types of worms. different types of viruses
Examples of worms include Morris Examples of viruses include Creeper,
9. worm, storm worm, etc. Blaster, Slammer, etc.
It does not need human action to
10. replicate.a that It needs human action to replicate.
Its spreading speed is slower as
11. Its spreading speed is faster. compared.
What Is Phishing?
Phishing attacks are the practice of sending fraudulent communications
that appear to come from a reputable source. It is usually done through
email. The goal is to steal sensitive data like credit card and login
information, or to install malware on the victim’s machine. Phishing is a
common type of cyber attack that everyone should learn about in order to
protect themselves. 
How does phishing work?
Phishing starts with a fraudulent email or other communication that is designed to
lure a victim. The message is made to look as though it comes from a trusted
sender. If it fools the victim, he or she is coaxed into providing confidential
information, often on a scam website. Sometimes malware is also downloaded onto
the target’s computer.

What are the dangers of phishing attacks?


Sometimes attackers are satisfied with getting a victim’s credit card information or
other personal data for financial gain. Other times, phishing emails are sent to obtain
employee login information or other details for use in an advanced attack against a
specific company. Cybercrime attacks such as advanced persistent threats (APTs)
and ransomware often start with phishing.
How do I protect against phishing attacks?
User education

One way to protect your organization from phishing is user education. Education
should involve all employees. High-level executives are often a target. Teach them
how to recognize a phishing email and what to do when they receive one. Simulation
exercises are also key for assessing how your employees react to a staged phishing
attack

IDENTITY THEFT
Identity Theft also called Identity Fraud is a crime which is being committed
in a huge number nowadays. Using the identity of another person and
attempting a practice for personal profit is termed as Identity threat.
This theft is committed in many ways by gathering personal information such
as transactional information of another person to make transactions.

Types of Identity Thefts :


There are various amount of threats but some common ones are :
 Criminal Identity Theft –
This is a type of theft in which the victim is charged guilty and has
to bear the loss when the criminal or the thief backs up his position
with the false documents of the victim such as ID or other
verification documents and his bluff is successful.
 Senior Identity Theft –
Seniors with age over 60 are often targets of identity thieves. They
are sent information that looks to be actual and then their personal
information is gathered for such use. Seniors must be aware of not
being the victim.
 Driver’s license ID Identity Theft –
Driver’s license identity theft is the most common form of ID theft.
All the information on one’s driver’s license provides the name,
address, and date of birth, as well as a State driver’s identity
number. The thieves use this information to apply for loans or credit
cards or try to open bank accounts to obtain checking accounts or
buy cars, houses, vehicles, electronic equipment, jewelry, anything
valuable and all are charged to the owner’s name.
 Medical Identity Theft –
In this theft, the victim’s health-related information is gathered and
then a fraud medical service need is created with fraud bills, which
then results in the victim’s account for such services.
 Tax Identity Theft –
In this type of attack attacker is interested in knowing your
Employer Identification Number to appeal to get a tax refund. This
is noticeable when you attempt to file your tax return or the Income
Tax return department sends you a notice for this.
 Social Security Identity Theft –
In this type of attack the thief intends to know your Social Security
Number (SSN). With this number, they are also aware of all your
personal information which is the biggest threat to an individual.
 Synthetic Identity Theft –
This theft is uncommon to the other thefts, thief combines all the
gathered information of people and they create a new identity.
When this identity is being used than all the victims are affected.
 Financial Identity Theft –
This type of attack is the most common type of attack. In this, the
stolen credentials are used to attain a financial benefit. The victim is
identified only when he checks his balances carefully as this is
practiced in a very slow manner.

You might also like