3.1 Types of malicious software