Your latest cybersecurity education video on defining threat actors and possible attacks gave the CIO a brilliant idea. She wants you to create a training guide on the various forms of malware to help train junior technicians in the IT department.
Create a table that compares common malware attack types (web application attacks) and purposes (backdoors, trojans, viruses, ransomware, intrusions, and wireless attacks). Include at least ten malware attack types and their characteristics in your table (including DOS and DDOS attacks and bots).