Malware
Rootkit
Principle of least privilege
Ring
Antivirus software
Operating system
Code injection
Vulnerability
Buffer overflow
Computer security
Cyberwarfare
Computing