Worm
Uses network connections to spread from system to system.
Electronic mail facility.
- A worm mails a copy of itself to other systems.
Remote execution capability.
- A worm executes a copy of itself on other systems.
Remote log-in capability.
- A worm logs on to a remote system as a user and then uses commands to copy itself from one system to the other.