A computer worm is a program that repeatedly copies itself and is similar to a computer virus. However, a virus needs to attach itself to an executable file and become part of it. A computer worm doesnt need to do that. It copies itself, travels to other networks and eats up a lot of bandwidth. A Trojan horse is a program that hides and seems to be a legitimate program but in reality is a fake. A certain action usually triggers the Trojan horse, and unlike viruses and worms they dont replicate. Computer viruses, worms, and Trojan horses are all classified as malicious-logic programs. These three are the most common but there many variations which are impossible to list here. You know when a computer is infected by a virus, worm, or Trojan horse if one or more of the following events take place:
This Code and the supplemental Guidelines were developed by the Task Force for the Revision of the ACM Code of Ethics and Professional Conduct: Ronald E. Anderson, Chair, Gerald Engel, Donald Gotterbarn, Grace C. Hertlein, Alex Hoffman, Bruce Jawer, Deborah G. Johnson, Doris K. Lidtke, Joyce Currie Little, Dianne Martin, Donn B. Parker, Judith A. Perrolle, and Richard S. Rosenberg. The Task Force was organized by ACM/SIGCAS and funding was provided by the ACM SIG Discretionary Fund. This Code and the supplemental Guidelines were adopted by the ACM Council on October 16, 1992.