30. فصل هشتم Communication security Trojan horse Trap door Logical bomb Bacteria Worm Macros & Executable content Virus Malicious Program برنامه های مخرب تهدیدهای امنیتی روی شبکه Eaves dropping on a payload Tampering with a payload Tampering with control information Replaying Traffic analysis Denial of service Masquerading Infilteration