Do viruses follow the OSI model?

February 22, 2011 at 20:25:19
Specs: Windows Vista
We have a discussion going on in my Networking class during our OSI model and TCP/IP model lessons. I have researched this, but cannot seem to come to a decent conclusion. Any pearls of wisdom or opinion on this topic would be appreciated.

See More: Do viruses follow the OSI model?

Report •

February 23, 2011 at 06:56:37
I would say that it depends on your definition of a virus. If it is a program that is designed to self replicate then it would most likely exist in layers 5-7. If it is a bot designed to disrupt service then it will probably use layers 1-4. So what kind of virus are we talking about?

Report •

February 23, 2011 at 08:23:28
Viruses are created to steal information [hacking]
Hackers use programming
Does programming follow the OSI model?

Answers are only as good as the information you provide.
How to properly post a question:
Sorry no tech support via PM's

Report •

February 23, 2011 at 10:52:09
I don't know it it is work at or work with. Some bots harvest ARP Tables which is a layer 2 function but they don't work at that layer they just work with. Semantics I guess.

Report •
Related Solutions

Ask Question