ICT (Second Preparatory)

Computer Security

Which of the following is a form of computer malware?