|A specific type of malicious software that self-replicates by infecting other files or systems
|A broader term that encompasses various types of malicious software
|Can replicate itself and spread to other files or systems
|Can include self-replicating viruses, but also includes other types of malicious software such as worms, Trojans, adware, spyware, ransomware, etc.
|Requires a host file or program to spread and infect
|Can be self-contained or depend on other files or systems for execution or spread
|Designed to cause damage, disrupt operations, or gain unauthorized access
|Designed for a variety of purposes including damage, theft, surveillance, or unauthorized access
|Often spread through infected email attachments, malicious downloads, or compromised websites
|Can be spread through various channels including email, websites, social engineering, removable media, etc.
|Can be easily detectable and identifiable as a specific type of virus
|Can be difficult to detect and may require specialized tools or techniques for identification
|Can delete, modify, or corrupt files, slow down the system, or spread to other systems
|Can include a range of actions such as stealing data, displaying unwanted ads, tracking user activities, encrypting files for ransom, etc.
|Can be detected by signature-based antivirus software
|Detection can be based on known signatures, heuristics, or behavior-based analysis
|Prevention and Removal
|Can be prevented and removed using antivirus software and regular system updates
|Requires the use of antivirus and antimalware software, regular updates, and safe browsing practices
|Examples include the Melissa virus, ILOVEYOU virus, etc.
|Examples include worms like Conficker, Trojans like Zeus, ransomware like WannaCry, etc.