3.2 The effects of different types of malicious software on an infected  system