• Software that aims to gather information about a person without his/her knowledge, and that may send such information to another entity


  • Legitimate software that allows companies to monitor and supervise the computers of their employees from a central location


  • Software used to disrupt computer operation or gain access to private computer systems


  • A computer program hidden within another seemingly harmless program that produces copies of itself and inserts them into another programs of files