Computer Viruses, Trojan Horses and Logic Bombs
![]()
Written by David. Stone, University Laboratory High School, Urbana, IL
Introduction
A number of different programs are written by malicious hackers with the intent of disruption or destruction of another individual's work efforts and computer files. The three most commonly encountered malicious programs- computer viruses, Trojan horses and logic bombs - are introduced in the following paragraphs.
Computer viruses get their name from their biological counterparts, true viruses. While a true virus replicates itself within a host species with variable impacts, a computer virus is "a specific type of malicious computer code that replicates itself or inserts copies or new versions of itself in other programs when executed within the infected program"(Fighting Computer Crime: A New Framework for Protecting Information, Don B. Parker, 1998). The virus can manifest itself in several ways including signs on the screen regarding its existence, erasure of memory or destruction of hard drive contents. Viruses can be written for all platforms, including, Macintosh and UNIX. Estimates of the total number of computer viruses vary dramatically. The majority of harmful viruses are written for PCs, since the code requirements to successfully execute a PC program are less exacting than those of Macintosh. Software companies responded to the virus problem by developing a number of anti-viral programs. Since the initial virus programs were written, a number of more sophisticated viral programs have been developed, requiring regular update of anti-viral software for best protection.
Trojan horse attacks are accomplished by inserting malicious code into other people's programs. When the user executes their program, they unintentionally execute the Trojan horse program. The Trojan horse programs are as variable as any other possible software program in their actions, and these Trojan horse programs may be used by criminals to commit fraud, embezzlement, sabotage and espionage. Software was the traditional source of Trojan horses, though many current web sites insert a small piece of code (a cookie) into your browser file, which may contain a Trojan horse.
A logic bomb is computer instruction that codes for a malicious act when certain criteria are met, such as a specified time in a computer's internal clock or a particular action, such as deletion of a program or file.
Issues
Ethical issues involving viruses, Trojan horses and logic bombs are virtually nonexistent. Each of these different types of code provide no benefit whatsoever, and are clearly the efforts of individuals (malicious hackers) whose primary interest is random harassment of individuals they will never encounter or know. Technological issues center around education and continued development and upgrade of anti-viral software. In a recent Champaign-Urbana News Gazette article entitled "Guarding Against Computer Viruses"(4/11/99), Mark Zinzow, University of Illinois Computer Virus Specialist, compares his mission against computer viruses and Trojan horses to worldwide efforts at controlling AIDS. In both cases, Zinzow makes clear the analogy between safe sex and safe computing, stating "Education about sex is the best defense against the AIDS virus, and education about computers is the best defense against cyberspace viruses." Numerous viruses have become known to the public during the last decade. In the early 1990s, the Michelangelo virus made its impact on March 6 - the artist's birthday. The virus erased the hard drive of affected computers upon turning on the machine. Most recently, the Melissa virus made international news in late March, 1999. This virus not only replicated itself in computer programs, it also mailed itself as an attachment to the last forty individuals who had benign electronic contact with the owner/user of the infected machine. An overview of the virus and its transmission can be found at http://www.uiuc.edu/ccso/us/pc/drsol/melissa.htmland at http://www.idg.net/idg_frames/english/content.cgi?vc=docid_9-127083.html. In the end, the best defense is a strong offense through regular update and use of anti-viral software, as well as regularly performing the actions outlined below.
Minimizing Potential for Introducing Computer Viruses, Trojan Horses and Logic Bombs
There are a number of ways to minimize potential for obtaining computer viruses, Trojan horses and logic bombs.
Individual Actions
Network/School Actions
Annotated Web Sites
AntiVirus
ResearchCenter (http://www.symantec.com/avcenter/vinfodb.html)
Produced by Symantec, the premiere producer of anti-viral software, this site
is clearly one of the most informative and best presented on the WWW.Suitable
for novices through expert computer users, individual sections include: 1)
General Virus Information, 2) Viruses: The Threat is Real, 3)Types of Viruses,
and 4) Macintosh Viruses.
McAfee.com - Anti-Virus (http://www.mcafee.com/anti-virus/)
This site gives the up to date on all the virus that are out there and what to use to protect your computer. Lists hoaxes, has a virus glossary and gives plenty of helpful tips.
Computer Viruses
(http://jaring.nmhu.edu/virus.htm)
Don't be misled by the generic name, this is an excellent list of links that
relate to many different aspect of computer viruses including: software types,
bulletins, virus list-serves and hoaxes.
Virus Information(http://www.commandcom.com/html/virus/virus.html)
Again, the name of the site doesn't do it justice in terms of the wealth of
information available. This site, oriented toward advanced users and network
administrators, provides valuable resources in its four sections: 1) Virus
Databases, 2) Virus Links and Utilities, 3) Virus Research and4) Writing on
Security Issues.
Anti-VirusResources
on the Web (http://www.tju.edu/tju/dis/virus/resources.html)
Fairly generic in terms of its presentation of many websites, the main value of
this page is clearly its links to electronic conferences, commonly used anti-viral
resources (freeware, shareware and commercial) and anti-viral software
comparisons.
TheRegulation
of Virus Research and the Prosecution for Unlawful Research(http://elj.warwick.ac.uk/jilt/compcrim/97_3kelm/default.htm)
An outstanding well-designed page introducing viruses and their impacts.
Includes an excellent, though brief, bibliography.
Return to Educator’s Guide to Computer Crime and Technology Misuse
Developed 3/5/99. Last modified 5/9/99.