Define the following key terms from this chapter, and check your answers in the glossary:
computer viruses
worms
mailers and mass-mailer worms
logic bombs
Trojan horses
back doors
exploits
downloaders
spammers
key loggers
rootkits
ransomware
ClamAV
Immunet