**4.4 Malware**

After gaining access to a system, the attacker takes the support of malware or malicious software that clandestinely acts against the interests of the computer user.
