6.1.6.2.3.3. Malicious Mobile Code
6.1.6.2.3. Network connections between the host and unknown remote systems
6.1.6.2.3.3. Malicious Mobile Code
6.1.6.2.3.1. Network Service Worm
6.1.6.2.3.2. Trojan Horse
6.1.6.2.3.4. Backdoor
6.1.6.2.3.5. Keystroke Logger
6.1.6.2.3.6. Rootkit
6.1.6.2.3.7. Malicious Browser Plug-Ins
6.1.6.2.3.8. E-mail Generators
By
Efrain Ortiz