Web threats encompass
               a broad array of threats that originate from the Internet. Web threats
               are sophisticated in their methods, using a combination of various files
               and techniques rather than a single file or approach. For example,
               web threat creators constantly change the version or variant used.
               Because the web threat is in a fixed location of a website rather
               than on an infected computer, the web threat creator constantly
               modifies its code to avoid detection.
            
 
            In recent years, individuals once characterized as hackers, virus
               writers, spammers, and spyware makers are now known as cyber criminals.
               web threats help these individuals pursue one of two goals. One
               goal is to steal information for subsequent sale. The resulting
               impact is leakage of confidential information in the form of identity
               loss. The infected computer may also become a vector to deliver
               phish attacks or other information capturing activities. Among other impacts,
               this threat has the potential to erode confidence in web commerce, corrupting
               the trust needed for Internet transactions. The second goal is to hijack
               a user’s CPU power to use it as an instrument to conduct profitable
               activities. Activities include sending spam or conducting extortion
               in the form of distributed denial-of-service attacks or pay-per-click
               activities.