A computer worm is normally designed to infect as many computers as possible using a number of different attack vectors, with each attack vector exploiting a certain weakness which might exist on computers -- for example, Window file shares, emails or buffer overflows in Web servers.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
In carrying out the attack, it is common for the worm to replace or modify webpages with its own content so it can spread itself to more computers. The problem with all of this attacking and modifying is that websites and computers will break due to the almost infinite variation of services and webpages. The worm, when patching and modifying a website with its code, can stop the page from being displayed properly or not at all. And when attacking different vectors, it can deny service by using up resources like bandwidth -- or denying access to the service by causing it to fail.
Related Q&A from Richard Brain
Managing vulnerabilities involves a wide array of security testing, including both dynamic and static source code analysis. Learn how the two differ,...continue reading
Which browsers are secure enough for enterprise use, and which should be avoided at all costs? In this expert response, Richard Brain examines the ...continue reading
Google cloud applications aren't necessarily known for their security. In this expert response, learn what to watch out for when considering using ...continue reading