malware
malicious software that cause an act of harm
viruses
They can replicate, infect, and harm other computers, they can delete, corrupt, or modifying files
worm
they can replicate in order to spread, they can slow down networks and computers
trojan horse
can damage, take control, and provide the user no access to their computer by hiding in somethings that use wants
ransomware
they can hold the computer hostage by locking/encrypting access to it until the ransom is paid by the attacker
spyware
allow the attacker to spy on the user's computer. they can record passwords or personal data entered
adware
display unwanted and frequent advertisement
botnets
allows the attacker to have free and anonymous access to user's computer
denial-of-service
sending floods of requests to the server as it can until the servers have enough and slow down or goes offline
rootkit
a program that aims to gain roots or admin access to the computer