Copies itself repeatedly, using up resources and possibly shutting down the computer or network|A malicious program that hides within or looks like a legitimate program|Program that hides in a computer and allows someone from a remote location to take full control