One‑page, ink‑saving explainer: how a threat can sneak in (Trojan), spread (Worm), hide (Rootkit), strike (Ransomware), and stay (Botnet/C2).
How it gets in.
How it spreads.
How it hides.
How it hurts.
How it stays.