A software program that delivers advertising content in a manner that is unexpected and unwanted by the user An attacker who controls a botnet A logical computer network of zombies under the control of an attacker Enhancements to the software to provide new or expanded functionality, but do not address security vulnerability Hardware or software designed to limit the spread of malware Computer code that lies dormant until it is triggered by a specific logical event A database of viruses that is used to identify an infected file