This document discusses various types of security threats and attacks in cyber security. It describes different types of malware like viruses, worms, Trojan horses, and bots. Viruses replicate by attaching to other programs while worms replicate over networks. Trojan horses conceal malicious code within legitimate software. Bots are automated processes that interact online without human interaction. The document also discusses different categories of malware like adware, spyware, ransomware, scareware, rootkits, and zombies based on their methods of infection and actions.