Spreads between systems based upon some user action
Virus
Spreads between systems by exploiting vulnerabilities, no user action required
Worm
Masquerades as desirable software to trick user into installing it
Trojan Horse
Denial of Service (DoS)
Distributed Denial of Service (DDOS)