This document discusses various types of malicious software, including viruses, worms, trojans, logic bombs, and zombies. It describes how these software spread and the damage they can cause. The document also summarizes approaches to countering malicious software, such as antivirus software, advanced emulation techniques, and behavior-blocking software that monitors programs in real-time to detect and prevent potentially malicious actions.