Security has always been an overriding concern of humankind. For any organization, information plays a very important role in running a business. Therefore, it becomes necessary to safeguard information from reaching the illegal hands. When data takes the shapes of digital form, a different security procedure is required. This branch of security is called computer security.
Information technology has also some loopholes associated with it, like the possibility of stealing of vital information and intentionally implanting destructive or malicious programs on the other’s computer system. The motive behind such activities is to slow down the pace of an organization and harm it economically. We shall discuss now these malicious programs which are often called a virus, worms, Trojan horse, logic bomb, spyware and so on.