Virus———————————————- Rootkit
Primarily runs as an application process ————————— Primarily runs as a part of OS/kernel
Usually gains user level access —————————————— Gains root/admin level access
Does not open backdoors ———————————————— Opens backdoors — viz., port, IP, etc.
Does not provide any remote access ———————————- Provides remote access to attacker
Fairly easy to detect and remove ————————————- Extremely difficult to detect and remove
Is meant to create nuisance and data damage —————– Is meant to cause privacy/data theft