International Research journal of Management Science and Technology

  ISSN 2250 - 1959 (online) ISSN 2348 - 9367 (Print) New DOI : 10.32804/IRJMST

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 59    Submit Your Rating     Cite This   Download        Certificate

SOCIETY CONCERNS TOWARDS COMPUTER VIRUSES LAWS

    1 Author(s):  ASHWANI KUMAR

Vol -  4, Issue- 3 ,         Page(s) : 515 - 519  (2013 ) DOI : https://doi.org/10.32804/IRJMST

Abstract

Computer viruses are a self-replicating segment of a computer code that resides in a host program. To explain how a virus works, look at how a computer operates. A computer executes instructions, which consist of machine code. A virus is a code that someone has written and placed inside the computer. Viruses basically perform two simple functions: they copy themselves to other programs and then they perform the task that the creator has written. The writers who created these viruses have complete control over them. First, they decide what the virus will do. This consists of deciding how it will replicate and what type of damage the virus will do. Second, the writer has control over when the virus will perform the destruction. The writer can make it perform as soon as the program executes or they can delay it until a certain date or time.

order buy online prescription
order online

1. Spafford, Eugene. "The Internet Worm: Crisis and Aftermath," in Communications of the ACM, June 1989.
2. http://www.net-security.sk/doc/e-zine/40hex/40hex-10.001.html
3. CERT Advisory CA-1992-02 Michelangelo PC Virus Warning. http://www.cert.org/advisories/CA-1992-02.html
4. Lemos, Robert. "Michelangelo Virus: Is it overhyped or a real threat?" ZDNet News, March 5, 1998.http://www.zdnet.com/zdnn/content/zdnn/0305/291988.html
5. Virus timeline. http://www.research.ibm.com/antivirus/timeline.htm
6. http://www.usdoj.gov:80/criminal/cybercrime or http://www.cybercrime.gov : Cybercrime website for the Department of Justice.
7. http://www.Loundy.com/E-LAW/E-Law4-full.html#VII : David J. Loundy. "E-LAW 4: Computer Information Systems Law and System Operator Liability," Seattle University Law Review, Volume 21, Number 4, Summer 1998.
8. http://vx.netlux.org/texts/laws/laws.htm : Links to anti-virus legislation for several states and countries.
9. http://www.landfield.com/faqs/computer-virus/alt-faq/part3/ : FAQ's for alt.comp.virus.
10. http://special.northernlight.com/compvirus/weaklaws.htm : "Computer Crimes Face Weak Laws," Associated Press, December 7, 2000.

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details