| Feature | Virus | Worm | Trojan |
|---|---|---|---|
| Self-Replication | Yes (requires host) | Yes (standalone) | No |
| Host File Needed | Yes | No | No |
| Primary Spread | Human action | Network vulnerabilities | Deception/Social Engineering |
Identify the Breach Type: When presented with a scenario, first determine which part of the CIA triad is affected. If data is stolen but not changed, it is a Confidentiality breach; if data is changed, it is an Integrity breach; if the system is down, it is an Availability breach.
Distinguish Malware: Look for the 'replication' factor. If the software spreads by itself across a network without user interaction, it is likely a Worm. If it requires a user to open a file, it is a Virus.
Check for Social Engineering: If an attack involves a person being tricked or manipulated (like a fake email or phone call), categorize it under Social Engineering or Phishing rather than a purely technical exploit.
Verify Defense Layers: Remember the concept of Defense in Depth. A single security measure (like a firewall) is rarely enough; exams often look for multi-layered approaches including encryption, MFA, and user training.