Free Computers research papers were donated by our members/visitors and are presented free of charge for informational use only.
The essay or term paper you are seeing on this page was not produced by our company and should not be considered a sample of our research/writing service.
This implies that worms and viruses may begin to appear in new classes of systems.
A knowledge of the histories of viruses and worms may make it possible to predict how malicious code will cause problems in the future.
What they choose to deny is that the nature of their actions are slowly consuming the fabric of our country’s moral and ethical trust in the information age.
Federal law enforcement agencies, as well as commercial computer companies, have been scrambling around in an attempt to "educate" the public on how to prevent computer crime from happening to them.They inform us whenever there is an attack, provide us with mostly ineffective anti-virus software, and we are left feeling isolated and vulnerable.I do not feel that this defensive posture is effective because it is not pro-active.In the past decade, computer and networking technology has seen enormous growth. With the advent of the "Information Highway", as it’s coined, a new methodology in crime has been created.Electronic crime has been responsible for some of the most financially devastating victimizations in society.Viruses have been almost exclusively restricted to personal computers, while worms have attacked only multi-user systems.A careful examination of the histories of viruses and worms can highlight the differences and similarities between these classes of malicious code.These attacks generally target known security vulnerabilities of systems.Many of these vulnerabilities are simply due to configuration errors.This leads to the possibility that a particular system is more susceptible to certain kinds of attacks.Malicious code, such as viruses and worms, attack a system in one of two ways, either internally or externally.