Taxonomy of Malicious Programs
Trapdoors
Logic Bombs
Trojan Horses
Needs Host
Program
Viruses
Bacteria
Worms
Independent
Malicious
Programs
Replicate
Previous slide
Back to first slide
View graphic version