Today, computer viruses are one of the most dangerous tools used by hackers to commit various cybercrimes, threatening information security, individual privacy, and the interests of institutions. It is important to note that this technical virus differs from a biological virus, and its name in the digital domain is metaphorical rather than literal. In the technical field, a virus is a computer program intentionally designed to attach itself to another program so that it operates when the host program is executed. It then replicates itself by attaching to other programs, sometimes modifying itself during reproduction, creating a new version each time the process is repeated.<br /><br />According to a report by the National Computing Center in the United States, viruses are considered attacking programs that infect computer systems in a manner similar to how biological viruses affect humans. The first conceptualization of an informational virus was credited to Dr. Fred Cohen during a seminar he conducted in 1983 at the University of Southern California on computer security. He defined a virus as “a program that infects other programs by inserting a copy of itself into them, which it reproduces and can develop over time during the reproduction process. It can spread through a system or network, causing significant changes to programs and data.”<br /><br />The danger of a virus lies in its ability to "hibernate" after infecting a system or program. Once it has embedded itself, the virus is undetectable during normal operations and cannot be identified by the system's users unless specialized detection software is used. The virus remains inactive until a set time when it is triggered, potentially destroying data, information, and programs stored within devices without damaging the hardware components.<br /><br />Nevertheless, viruses in the field of information technology can have two objectives: one legitimate and the other harmful. The first is the “positive protective purpose,” where the virus is designed to protect a system from unauthorized copying. Once copied, the virus activates and destroys the system it’s running on. The second objective is “negative destructive intent,” where the virus’s creator aims to cause damage and destruction for personal gain.<br /><br />In reality, viruses are created by skilled programmers who specialize in malicious software development. They then find ways to spread these viruses to unsuspecting users' devices. As antivirus programs become more advanced, so do these programmers, who continuously evolve their viruses to outsmart detection methods. Often, the intention behind creating these viruses is to demonstrate superiority, create confusion, or even to harm others, which is extremely detrimental.<br /><br />The main characteristics of viruses include their ability to hide, spread, penetrate, and destroy. One example of a virus-related crime occurred in Australia, where a student accessed the computer system of Swinburne University of Technology and inserted a preparatory program containing a virus. This caused the destruction of all data on magnetic disks that were connected to the system, as well as damaging the physical hardware components.<br /><br />Sustainability Goals Addressed in the Article:<br /><br />This article addresses the following Sustainable Development Goals (SDGs):<br /><br />Goal 9: Industry, Innovation, and Infrastructure: The article touches on the impact of cybercrimes and viruses on technological infrastructure, emphasizing the importance of secure systems and innovation in developing effective security measures.<br /><br />Goal 16: Peace, Justice, and Strong Institutions: The focus on combating cybercrimes through strong legal frameworks and technological safeguards contributes to the need for accountable institutions in the realm of information security.<br />Al-Mustaqbal University is the leading private university in Iraq