Defining a Computer Virus

Sara

Designed to replicate relentlessly, computer viruses infect your programs and files, alter the It is estimated that the Conficker virus infected more than 10 million computers in 2009. Tens of thousands of computer viruses now operate over the Internet, and new computer viruses are discovered every day. Sourced from: http://www.webroot.com/us/en/home/resources/articles/pc-security/computer-security-threats-computer-viruses

The internet is the ideal hub for computer viruses where unsuspecting users become daily victims.

Tens of thousands of computer viruses now operate over the Internet, and new computer viruses are discovered every day. Sourced from: http://www.webroot.com/us/en/home/resources/articles/pc-security/computer-security-threats-computer-viruses

The antivirus program protects your computer and the personal information in it. Sourced from: http://typeslist.com/different-types-of-computer-viruses/

Many worms will use more than one method in order to spread copies via networks. Sourced from: http://www.kaspersky.com/internet-security-center/threats/viruses-worms

Your computer may be infected if you recognize any of these malware symptoms: Slow computer performance Erratic computer behavior Unexplained data loss Frequent computer crashes Sourced from: http://www.webroot.com/us/en/home/resources/articles/pc-security/computer-security-threats-computer-viruses

What are Computer Crimes?

Sara

They They include activities like software theft, wherein the privacy of users is hampered. These criminal activities involve the breach of human and information privacy, as the theft and illegal alteration of system-critical information. Sourced from: http://www.buzzle.com/articles/types-of-computer-crimes.html

The criminal or cyber crimes infringe on human and information privacy, steal, as well as, alter critical information illegally.

These criminals are often discovered frequenting internet chat rooms, where they pose as young people in order to lure minor victims into romantic encounters. Sourced from: http://www.hg.org/computer-crime.html

Obscene emails, abusive phone calls, and other such serious effects of cyber stalking have made it a type of computer crime. Sourced from: http://www.buzzle.com/articles/types-of-computer-crimes.html