Week-11 Discussion

 What are some of the characteristics and operations of some of the malicious software that exists today?