An organization's network has been infected with a software that propagates itself across computers, encrypting files and demanding payment for the decryption key. Which of the following BEST describes this type of malicious code?
|Threats, Vulnerabilities, and Mitigations
|Security Program Management and Oversight
|General Security Concepts