ěhave considered:
various malicious programs
trapdoor, logic bomb, trojan horse, zombie

viruses
worms
countermeasures
distributed denial of service attacks