ICT (Second Preparatory)

Cybersecurity

Which of the following is a type of malicious software?