| 6.1.6.2.3. Network connections between the host and unknown remote systems |
| 6.1.6.2.3.7. Malicious Browser Plug-Ins |
| 6.1.6.2.3.1. Network Service Worm |
| 6.1.6.2.3.2. Trojan Horse |
| 6.1.6.2.3.3. Malicious Mobile Code |
| 6.1.6.2.3.4. Backdoor |
| 6.1.6.2.3.5. Keystroke Logger |
| 6.1.6.2.3.6. Rootkit |
| 6.1.6.2.3.8. E-mail Generators |