Identification should include
- viruses (e.g., boot sector, program, script, macro, multipartite)
- worms
- trojans, bots, backdoors, and remote access trojans (RATs)
- spyware, adware, and keyloggers
- rootkits
- ransomware, crypto-malware, and logic bombs.
Teacher Resource:
CYBER.ORG, Lab: Creating a backdoor/RAT lab