<Tr> <Th> Defenses </Th> </Tr> <Tr> <Td> <Ul> <Li> Computer access control </Li> <Li> Application security <Ul> <Li> Antivirus software </Li> <Li> Secure coding </Li> <Li> Security by design </Li> <Li> Secure operating systems </Li> </Ul> </Li> <Li> Authentication <Ul> <Li> Multi-factor authentication </Li> </Ul> </Li> <Li> Authorization </Li> <Li> Data - centric security </Li> <Li> Firewall (computing) </Li> <Li> Intrusion detection system </Li> <Li> Intrusion prevention system </Li> <Li> Mobile secure gateway </Li> </Ul> </Td> </Tr> <Ul> <Li> Computer access control </Li> <Li> Application security <Ul> <Li> Antivirus software </Li> <Li> Secure coding </Li> <Li> Security by design </Li> <Li> Secure operating systems </Li> </Ul> </Li> <Li> Authentication <Ul> <Li> Multi-factor authentication </Li> </Ul> </Li> <Li> Authorization </Li> <Li> Data - centric security </Li> <Li> Firewall (computing) </Li> <Li> Intrusion detection system </Li> <Li> Intrusion prevention system </Li> <Li> Mobile secure gateway </Li> </Ul> <Li> Computer access control </Li>

One criteria that makes a piece of malware a virus