ABSTRACT

One of the more common and signicant forms of cyber crime victimization is the destruction of data les due to malicious so¯ware (malware; Furnell, 2002; Taylor, Caeti, Loper, Fritsch, & Liederbach, 2006). Malware typically includes computer viruses, worms, and Trojan horse programs that alter functions within computer programs and les. Viruses can conceal their presence on computer systems and networks and can spread via e-mail attachments, downloadable les, instant messaging, and other methods (Kapersky, 2003; Szor, 2005; Taylor et al., 2006). Trojan horse programs also o¯en arrive via e-mail as a downloadable le or an attachment that people would be inclined to open, such as les titled “XXX Porn” or “Receipt of Purchase.” When the le is opened, it executes some form of malicious code (Furnell, 2002; Szor, 2005; Taylor et al., 2006). In addition, some malware is activated by visiting websites-particularly, pornographic websites-that exploit ´aws in web browsers (Taylor et al., 2006). Although worms do not involve as much user interaction as other malware because of its ability to use system memory and to send copies of itself, humans can facilitate its spread by simply opening e-mails that have the worm code embedded into the le (Nazario, 2003).