Dogaong, Charlie L. BSIT
The Department of Justice categorizes computer crime in three ways: The computer as a target – attacking the computers of others (spreading viruses is an example). The computer as a weapon -
using a computer to commit "traditional crime" that we see in the physical world (such as fraud or illegal gambling). The computer as an accessory – using a computer as a "fancy filing cabinet" to store illegal or stolen information.
malware that, when executed, replicates by inserting copies of itself. possibly modified into other computer programs, data files, or the boot sector of the hard drive self-replicating computer programs which install themselves without the user's consent.
stealing hard disk space or CPU time, accessing private information, corrupting data
Storm Virus, Sasser Virus, Nimda Virus, Melissa Virus, Code Red I and II Computer Viruses, Morris Computer Virus, ILOVEYOU Virus, Brain Computer Virus, Conficker, Elk Cloner
Melissa was a new virus for a new age: the age. Forget floppies, this one was among the first to spread via the dreaded attachment.
It also pioneered the art of breaking into your address book and sending itself to all your contacts. The virus would arrive via an innocent-looking that told you to open a document.
First found on March 26, 1999, Melissa shut down Internet systems that got clogged with infected s propagating from the virus. Melissa was not originally designed for harm, but it overloaded servers and caused problems.
David L. Smith
Eaton Town, New Jersey
Smith was sentenced to 10 years serving 20 months was fined US $5,000