The document provides an overview of malicious software including viruses, worms, Trojan horses, and distributed denial of service (DDoS) attacks. It defines viruses as self-replicating code that attaches itself to other programs and executes when the host program runs. Worms are independent programs that replicate themselves across networks to infect other computers. The document also describes other types of malicious software like backdoors, logic bombs, and Trojan horses, and explains how DDoS attacks are constructed to overwhelm servers.