-Attaches itself to or copies itself into another program on a computer
-Tricks the computer into following instructions not intended by the original program developer
-Infects a host program any may cause that host program to replicate itself to other computers
-User who runs infected program authenticates the virus