6.1.6.2.3. Network connections between the host and unknown remote systems |
6.1.6.2.3.7. Malicious Browser Plug-Ins |
6.1.6.2.3.1. Network Service Worm |
6.1.6.2.3.2. Trojan Horse |
6.1.6.2.3.3. Malicious Mobile Code |
6.1.6.2.3.4. Backdoor |
6.1.6.2.3.5. Keystroke Logger |
6.1.6.2.3.6. Rootkit |
6.1.6.2.3.8. E-mail Generators |