Web sites that host application which is covertly downloaded to a person's device to gather facts and keep track of person action, and websites that are infected with destructive or malicious application, precisely designed to problems, disrupt, attack or manipulate Computer system units without the person's consent, for example virus or Malicious