are called the payload of the virus. The consequences may range from corruption and deletion of data; propagation of virus on to network and deployment through attachments through emails in order to further creating havoc to all associated computing devices. A Viruse may be classified by it's method of concealment (hiding). Plus, data collected and stored in serves needs to be protected from any type of disaster either physically or electronically. The same way real world crimes occur, cyber world crimes occur in the same fashion. It will analyze the various crimes that make up computer crime and see what changes it has brought about in the world in which we live. Then, they were largely created inuniversity laboratories by mostly wayward geniuses keen to pit theirprogramming skills against each other. Computer crime first is a very new problem in our society today and it is crimes that are committed from a computer. The extent of this threat can only be determined by evaluating many different factors. tags: Internet Crime Essays Free Essays 2353 words (6.7 pages) Preview - How computer viruses work Computer viruses are not understood very well, but they get your attention.
The extra ten percent is to cover, and work around, errors that you yourself might make. Now you're confused right. Another example of someone prosecuted using the cfaa is Keith Downey. tags: surveys, fraud, firewalls Free Essays 683 words (2 pages) Preview. Thus with the increasing use of computers, the possibility of having problems with computers becomes naturally higher.