Computer Fraud and Abuse Act of 1986 - Research Article from Macmillan Science Library: Computer Sciences

This encyclopedia article consists of approximately 6 pages of information about Computer Fraud and Abuse Act of 1986.

Computer Fraud and Abuse Act of 1986 - Research Article from Macmillan Science Library: Computer Sciences

This encyclopedia article consists of approximately 6 pages of information about Computer Fraud and Abuse Act of 1986.
This section contains 124 words
(approx. 1 page at 300 words per page)
Buy the Computer Fraud and Abuse Act of 1986 Encyclopedia Article

The term "virus" is often used generically to identify any harmful migrating computer program. However, more strictly defined, a "worm" is a program that travels from one computer to another, usually over a network, but does not attach itself to the operating system of the computer it "infects." It replicates itself until the host computer runs out of memory or disk space. A "Trojan horse" is a piece of computer software that acts like it has a benign purpose, but is actually performing an ulterior malicious command, such as erasing files. A "virus" insidiously attaches itself to the operating system of any computer it enters and can infect any other computer that uses files from the infected computer.

(read more)

This section contains 124 words
(approx. 1 page at 300 words per page)
Buy the Computer Fraud and Abuse Act of 1986 Encyclopedia Article
Copyrights
Macmillan
Computer Fraud and Abuse Act of 1986 from Macmillan. Copyright © 2001-2006 by Macmillan Reference USA, an imprint of the Gale Group. All rights reserved.