skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 136939 Find in a Library
Title: Computer Viruses, Computer Hackers: Security Threats of the 1990s
Author(s): M J Lee
Date Published: 1991
Page Count: 93
Type: Survey
Format: Document
Language: English
Country: United States of America
Annotation: This book discusses the basic of computer viruses and hackers and is designed to provide a thorough introduction to the security manager and/or lay reader.
Abstract: The definition of computer virus covers viruses, Trojan Horses, time bombs, and worms. The origins of computer viruses are explored, and several case studies are presented. Almost all viruses are planted in computer systems by hackers, agents of foreign governments, or disgruntled employees. Viruses are introduced directly into the targeted computer system or are caught through public domain software. Illegally obtained software and new software coming out of infected production sites are other common carriers. There are many virus detection and protection programs available; while this manual does not review specific programs, it does outline common characteristics. The author emphasizes that every organization must have a disaster recovery plan ready to implement when a computer virus infects the system. This book also discusses the computer underground and Bulletin Board Systems and profiles the typical computer hacker.
Main Term(s): Computer crime prevention measures; Computer viruses
Index Term(s): Computer related crime
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.