This document discusses various types of malware and cyber attacks. It describes crimeware as software used to perpetrate illegal acts, such as identity theft, and notes it can spread through viruses, Trojans, worms, spyware or adware. Trapdoors and backdoors allow unauthorized access to systems by bypassing authentication. Keyloggers record keystrokes to steal personal or financial information. Spoofing tricks networks by masquerading as a legitimate entity. Phishing uses fraudulent emails to steal information. Sniffing monitors network traffic to extract passwords and other data from packets. Port scanning identifies open ports that could enable unauthorized access. SQL injection allows interference with database queries and access to data.