Malware
computer virus
Backdoor�
Logic Bomb�
Trojan horse
• Continuing to perform the function of the original program and additionally performing a separate malicious activity
• Continuing to perform the function of the original program but modifying the function to perform malicious activity (e.g., a Trojan horse version of a login program that collects passwords) or to disguise other malicious activity (e.g., a Trojan horse version of a process listing program that does not display certain processes that are malicious)
• Performing a malicious function that completely replaces the function of the original program
Mobile Code�
Spyware/Adware�
Rootkit�