kurt wismer said:
Richard S. Westmoreland wrote:
[snip]
For the sake of the critique, let's
all pretend that Spam is both Malware and a Threat (security or
resource).
Accepting that, would you agree with the way the Triangle is laid out?
Do
you think this triangle can be useful in any way?
no... i criticized practically every relationship depicted there and so
far the only criticism that has been contentious was whether or not
spam qualified as malware...
Yes, I remember you saying something about viruses, worms, spyware, were all
trojans (did I get that right?).
So let's put the Spam issue aside for now and look at that. Let's try to
clearly define them.
Virus:
An executable code that injects itself into other executable codes as a
means of replicating itself. It executes without user intervention. When
the infected executable code is ran, it then starts the process over. This
includes EXEs, BATs, VBSs, Macros, Boot Sectors, etc. The primary damage is
to the Integrity of the system (since code has been tampered).
Worm:
An executable code that creates copies of itself. It's execution requires
user intervention. It spreads itself to other locations, i.e. file shares,
or via smtp to people's email addresses, or just other folders. Both
integrity and availability has been damaged (since the worm has infiltrated
the file system and also taken up resources).
Spyware:
An executable code that does not create copies of itself. It's execution
may or may not require user intervention. It typically stays as a single
copy. The sole purpose of spyware is to gather information about the user's
computer system and his/her activities. The primary damage is
confidentiality.
Trojan:
An executable code that does not create copies of itself, but tends to work
in conjunction with viruses (which drop them). Trojans tend to mimick
legitimate programs to avoid detection. They open remote access to an
attacker or other automated program to pass commands to the system. Both
integrity and confidentiality has been damaged (since the trojan is posing
as legitimate programs and also allowing unauthorized access to the system).
Is there any fault in these definitions?
Rick