1.1 A worm is a small program that moves through a
computer system and memory randomly changing or
overwriting pieces of data as it moves. It spreads around
the computer network trying to make as much damage as
2 Trojan Virus
2.1 A Trojan horse is a standalone malicious file or program that does not
attempt to inject itself into other files, unlike a computer virus, and often
poses as a real file or program. Trojan horses can make copies of
themselves, steal information, or harm their host computer systems. You
won’t notice it being there, it will sit in there, until it gets all the information it
needs. It will look like it is meant to be on your computer.
3.1 A computer virus is a computer program that can copy itself and spread from one computer to
another. Anti-virus programs check for a great many problems, and generally protect your
computer very well. But when your computer is infected, it’s always a good idea to
occasionally use a second program to get a second opinion to make sure your system is free
of malware that anit-virus programs don’t always detect.
4 Computer Misuse Act 1990
4.1 The Computer Misuse Act became law in
August 1990. Under the act hacking and the
introduction of virus are a criminal defence.
5.1 Spyware is a type of malware installed on computers
that collects information about users without their
knowledge. The presence of spyware is typically hidden
from the user and can be hard to detect.
6.1 In criminal law, a fraud is an intentional deception made for
personal gain or to damage another individual. Fraud is a
crime, and also a civil law violation
7.1 A cookie, also know as an HTTP cookie, web cookie,
or browser cookie, is usually a small piece of data sent
from a website and stored in a user’s web browser
while a user is browsing a website