Contrast the following types of remote attacks: virus, worm, phishing, and spear phishing? Solution Computer virus: A virus attaches itself to a file and will affect the computer. It can spread from one computer to another and leave infection. They are generally attached to executable files and can only affect your computer if you execute the program. Generally the host computer will still function, unless the virus damages the host program altogether. Worms: Worms are quite similar to viruses, they spread from one computer to another and infect the host computer. But they don\'t have to attached to any other file or program. they can\'t act as stand alone programs. Phishing: It is a scam in which the hacker will try to learn your sensitive login information by posing as a legitimate entity. Generally the victim receives an email sent by a legitimate organization. The email will redirect the user to install some malware or login with credentials on a fake but legitimate looking software. Spear phising: Phishing attack directed at specific individuals or organization to gain access to their confidential data is known as spear phishing. Thie is genrally done for financial gain by the competitors..