SlideShare ist ein Scribd-Unternehmen logo
1 von 29
CYBER CRIMES
Ivy Rose B. Recierdo
BSED I - A
What is Cybercrime?
 Refers to all the activities done with criminal
intent in cyberspace.
 Refers to any crime that involves a
computer/mobile and a network. The computer
may have been used in the commission of a
crime, or it may be the target.
History
 The first
recorded
cybercrime took
place in the year
1820.
 When computers and networks came
into being in the 1990s, hacking was
done basically to get more
information about the systems.
 As hackers became more skilful, they
started using their knowledge and
expertise to gain benefit by exploiting
and victimizing others.
Causes of Cybercrime
 Accessing sensitive information and
data and using it means a rich
harvest of returns Hence, this has
led to a rise in cyber crime across the
world.
Classification of Computer
Crimes
 Fraud and financial crimes
 Cyber terrorism
 Cyber extortion
 Cyber warfare
Fraud and Financial
Crimes
 Computer fraud is any dishonest
misrepresentation of fact
intended to let another to do or
refrain from doing something
which causes loss. Result in
obtaining a benefit by:
Altering in an unauthorized way.
Altering, destroying, suppressing, or
stealing output, usually to conceal
unauthorized transactions.
Altering or deleting stored data
Cyber Terrorism
 Cyber Terrorism in general, can be
defined as an act of terrorism
committed through the use of
cyberspace or computer resources.
 A cyber terrorist is someone who
intimidates or coerces a government
or organization to advance his or her
political or social objectives by
launching a computer-based attack
against computers, networks, or the
information stored on them.
Cyber Extortion
 Cyber extortion occurs when a
website, e-mail server, or computer
system is subjected to or threatened
with repeated denial of service or
other attacks by malicious hackers.
 Hackers demand money in return for
promising to stop the attacks and to
offer "protection.”
Categorization of Cyber
Crime
 Individual
 Property
 Government
Types of Computer
Crimes
Hacking
 Hacking in
simple terms
means an illegal
intrusion into a
computer
system and/or
network.
Denial of Service (DoS)
Attack
 Act by the criminal, who
floods the bandwidth of the
victim’s network.
 In his e-mail box with spam
mail depriving him of the
services.
Cyber Stalking
 This is a kind of online harassment
wherein the victim is subjected to a
barrage of online messages and
emails. Typically, these stalkers know
their victims and instead of resorting
to offline stalking, they use the
Internet to stalk to make the victims’
lives more miserable.
Identity Theft
 In this cyber crime, a criminal
accesses data about a person’s bank
account, credit cards, Social Security,
debit card and other sensitive
information to steal money or to buy
things online in the victim’s name. It
can result in major financial losses for
the victim and even spoil the victim’s
credit history.
Malicious Software
 These are Internet-based software or
programs that are used to disrupt a
network. The software is used to gain
access to a system to steal sensitive
information or data or causing
damage to software present in the
system.
Child soliciting and Abuse
 This is also a type of cyber crime
wherein criminals solicit minors via
chat rooms for the purpose of child
pornography.
Computer Vandalism
 Damaging or destroying data rather
than stealing.
 Transmitting Virus
Cyber Terrorism
 Use of Internet base attacks in
terrorist activities.
Software Piracy
 Theft of software through the illegal
copying of genuine programs.
 Distribution of products intended to
pass for the original.
Virus Dissemination
 Malicious
software that
attaches itself
to other
software. (virus,
worms, Trojan
Horse, web
jacking, e-mail
bombing, etc.)
Categories Of Computer
Viruses
Categories of Computer
Viruses
 Boot Sector Viruses – infects the
boot record of a hard or floppy disk.
 Cluster Viruses – this type of virus
make changes to a disk’s file system.
 File-Infecting Viruses – this type of
virus infects program files on a disk
(such a EXE or COM files).
Categories of Computer
Viruses
 Worms – a worm is a program
whose purpose is to duplicate itself. It
is commonly spread over the Internet
via e-mail message attachments and
Internet Relay Chat (ICR).
 Bombs – this type of virus hides on
the user’s disk and waits for a
specific event to occur before
running.
Categories of Computer Viruses
 Trojan Horses – is a malicious
program that appears to be friendly,
they are not technically viruses. But,
because they can do harm, they are
considered viruses.
 Stealth Viruses – these viruses take
up residence in the computer’s
memory, making them hard to detect.
Categories of Computer
Viruses
 Polymorphic, Self-Garbling, Self-
Encrypting, or Self-Changing
Viruses – this type of virus can
change itself each time it is copied,
making it difficult to isolate.
 Macro Viruses – a virus designed to
infect a specific type of document file,
such as Microsoft Word or Excel files.
Computer Crimes

Weitere ähnliche Inhalte

Was ist angesagt?

Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
mulikaa
 

Was ist angesagt? (20)

Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 

Andere mochten auch (9)

Computer crimes and criminals
Computer crimes and criminalsComputer crimes and criminals
Computer crimes and criminals
 
La internet en la sociedad 5 to-a _nº 23 melany
La internet en la sociedad  5 to-a _nº 23  melanyLa internet en la sociedad  5 to-a _nº 23  melany
La internet en la sociedad 5 to-a _nº 23 melany
 
The role of erp for global businesses
The role of erp for global businessesThe role of erp for global businesses
The role of erp for global businesses
 
Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime's
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Disaster management ppt
Disaster management pptDisaster management ppt
Disaster management ppt
 

Ähnlich wie Computer Crimes

Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
Mohammad Ahmed
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 

Ähnlich wie Computer Crimes (20)

Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
cyber crime
cyber crime cyber crime
cyber crime
 
NS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfNS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdf
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 

Kürzlich hochgeladen

💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG
💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG
💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG
Cara Menggugurkan Kandungan 087776558899
 
Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...
Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...
Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...
Heena Escort Service
 
Jual Obat Aborsi Kudus ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cy...
Jual Obat Aborsi Kudus ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cy...Jual Obat Aborsi Kudus ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cy...
Jual Obat Aborsi Kudus ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cy...
ZurliaSoop
 
Sociocosmos empowers you to go trendy on social media with a few clicks..pdf
Sociocosmos empowers you to go trendy on social media with a few clicks..pdfSociocosmos empowers you to go trendy on social media with a few clicks..pdf
Sociocosmos empowers you to go trendy on social media with a few clicks..pdf
SocioCosmos
 
Capstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdfCapstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdf
eliklein8
 
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
Health
 
JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...
JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...
JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...
Cara Menggugurkan Kandungan 087776558899
 
Capstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdfCapstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdf
eliklein8
 
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
ZurliaSoop
 

Kürzlich hochgeladen (17)

BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIRBVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
 
💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG
💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG
💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG
 
Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...
Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...
Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...
 
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic HappensIgnite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
 
Marketing Plan - Social Media. The Sparks Foundation
Marketing Plan -  Social Media. The Sparks FoundationMarketing Plan -  Social Media. The Sparks Foundation
Marketing Plan - Social Media. The Sparks Foundation
 
Enhancing Consumer Trust Through Strategic Content Marketing
Enhancing Consumer Trust Through Strategic Content MarketingEnhancing Consumer Trust Through Strategic Content Marketing
Enhancing Consumer Trust Through Strategic Content Marketing
 
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdfSEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
 
Content strategy : Content empire and cash in
Content strategy : Content empire and cash inContent strategy : Content empire and cash in
Content strategy : Content empire and cash in
 
Jual Obat Aborsi Kudus ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cy...
Jual Obat Aborsi Kudus ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cy...Jual Obat Aborsi Kudus ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cy...
Jual Obat Aborsi Kudus ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cy...
 
Sociocosmos empowers you to go trendy on social media with a few clicks..pdf
Sociocosmos empowers you to go trendy on social media with a few clicks..pdfSociocosmos empowers you to go trendy on social media with a few clicks..pdf
Sociocosmos empowers you to go trendy on social media with a few clicks..pdf
 
The Butterfly Effect
The Butterfly EffectThe Butterfly Effect
The Butterfly Effect
 
Capstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdfCapstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdf
 
Capstone slide deck on the TikTok revolution
Capstone slide deck on the TikTok revolutionCapstone slide deck on the TikTok revolution
Capstone slide deck on the TikTok revolution
 
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
 
JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...
JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...
JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...
 
Capstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdfCapstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdf
 
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
 

Computer Crimes

  • 1. CYBER CRIMES Ivy Rose B. Recierdo BSED I - A
  • 2. What is Cybercrime?  Refers to all the activities done with criminal intent in cyberspace.  Refers to any crime that involves a computer/mobile and a network. The computer may have been used in the commission of a crime, or it may be the target.
  • 3. History  The first recorded cybercrime took place in the year 1820.
  • 4.  When computers and networks came into being in the 1990s, hacking was done basically to get more information about the systems.  As hackers became more skilful, they started using their knowledge and expertise to gain benefit by exploiting and victimizing others.
  • 5.
  • 6. Causes of Cybercrime  Accessing sensitive information and data and using it means a rich harvest of returns Hence, this has led to a rise in cyber crime across the world.
  • 7. Classification of Computer Crimes  Fraud and financial crimes  Cyber terrorism  Cyber extortion  Cyber warfare
  • 8. Fraud and Financial Crimes  Computer fraud is any dishonest misrepresentation of fact intended to let another to do or refrain from doing something which causes loss. Result in obtaining a benefit by: Altering in an unauthorized way.
  • 9. Altering, destroying, suppressing, or stealing output, usually to conceal unauthorized transactions. Altering or deleting stored data
  • 10. Cyber Terrorism  Cyber Terrorism in general, can be defined as an act of terrorism committed through the use of cyberspace or computer resources.
  • 11.  A cyber terrorist is someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching a computer-based attack against computers, networks, or the information stored on them.
  • 12. Cyber Extortion  Cyber extortion occurs when a website, e-mail server, or computer system is subjected to or threatened with repeated denial of service or other attacks by malicious hackers.  Hackers demand money in return for promising to stop the attacks and to offer "protection.”
  • 13. Categorization of Cyber Crime  Individual  Property  Government
  • 15. Hacking  Hacking in simple terms means an illegal intrusion into a computer system and/or network.
  • 16. Denial of Service (DoS) Attack  Act by the criminal, who floods the bandwidth of the victim’s network.  In his e-mail box with spam mail depriving him of the services.
  • 17. Cyber Stalking  This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails. Typically, these stalkers know their victims and instead of resorting to offline stalking, they use the Internet to stalk to make the victims’ lives more miserable.
  • 18. Identity Theft  In this cyber crime, a criminal accesses data about a person’s bank account, credit cards, Social Security, debit card and other sensitive information to steal money or to buy things online in the victim’s name. It can result in major financial losses for the victim and even spoil the victim’s credit history.
  • 19. Malicious Software  These are Internet-based software or programs that are used to disrupt a network. The software is used to gain access to a system to steal sensitive information or data or causing damage to software present in the system.
  • 20. Child soliciting and Abuse  This is also a type of cyber crime wherein criminals solicit minors via chat rooms for the purpose of child pornography.
  • 21. Computer Vandalism  Damaging or destroying data rather than stealing.  Transmitting Virus Cyber Terrorism  Use of Internet base attacks in terrorist activities.
  • 22. Software Piracy  Theft of software through the illegal copying of genuine programs.  Distribution of products intended to pass for the original.
  • 23. Virus Dissemination  Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing, etc.)
  • 25. Categories of Computer Viruses  Boot Sector Viruses – infects the boot record of a hard or floppy disk.  Cluster Viruses – this type of virus make changes to a disk’s file system.  File-Infecting Viruses – this type of virus infects program files on a disk (such a EXE or COM files).
  • 26. Categories of Computer Viruses  Worms – a worm is a program whose purpose is to duplicate itself. It is commonly spread over the Internet via e-mail message attachments and Internet Relay Chat (ICR).  Bombs – this type of virus hides on the user’s disk and waits for a specific event to occur before running.
  • 27. Categories of Computer Viruses  Trojan Horses – is a malicious program that appears to be friendly, they are not technically viruses. But, because they can do harm, they are considered viruses.  Stealth Viruses – these viruses take up residence in the computer’s memory, making them hard to detect.
  • 28. Categories of Computer Viruses  Polymorphic, Self-Garbling, Self- Encrypting, or Self-Changing Viruses – this type of virus can change itself each time it is copied, making it difficult to isolate.  Macro Viruses – a virus designed to infect a specific type of document file, such as Microsoft Word or Excel files.