Abstract

This study examines the functionality and propagation patterns of computer viruses, worms, and Trojan horses detected during a 12-month period beginning on January 1, 2004. Using data obtained from threat reports prepared by a major vendor of computer security products, the authors find that these unique forms of cybercrime warrant general concern but that their overall threat to corporate, government, and end computer users thus far has been exaggerated. The authors conclude that greater attention must be paid to the role of the computer user in the spread of viruses and other malicious software and to the small handful of chronic offenders who contribute disproportionately to the problem.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call