▸ THREAT SELECTION (CHANGED)
VIRUS
Replicates and attaches to files; may corrupt or delete data.
TROJAN
Disguised as legitimate software; opens backdoors and remote access.
WORM
Self-propagates across networks without user action.
▸ COMMAND CENTER
▸ SYSTEM STATUS
TOTAL SYSTEMS48
COMPROMISED0
SECURE48
🦠 NETWORK TOPOLOGY
▸ SECURITY LOG TERMINAL
> System initialized. Awaiting command...