Relacionar Columnas Malware and Cyber Attack Types Matching GameVersión en línea Test your knowledge of malware and cyber attack types with this fun matching pairs game! por Spencer Carlson 1 Man-in-the-Middle Attack (MITM) 2 Spyware 3 Trojan Horse 4 Social Engineering 5 Backdoor 6 RootKit 7 Zero-Day 8 Cross-Site Scripting (XSS) 9 Virus 10 Brute Force Attack 11 Keylogger 12 DDoS Attack 13 Ransomware 14 Botnet 15 SQL Injection 16 Phishing 17 Adware 18 Session Hijacking 19 DNS Spoofing 20 Worm Targets vulnerabilities not yet patched. Collects user information secretly, often for advertising. Injects scripts into web pages to compromise users. Network of infected devices for large-scale attacks. Manipulates database queries to steal data. Overloads systems to cause unavailability. Disguises itself as legitimate software to gain access. Tricks users into sharing sensitive info via fake sites. Intercepts communication for data theft. Hides deep in systems to evade detection and control. Bypasses security for unauthorized remote access. Records keystrokes to capture sensitive info. Manipulates people into compromising security. Tries numerous password combinations to gain access. Steals active session data to impersonate users. Displays unwanted ads, can slow systems down. Attaches to files, spreads when files are executed. Encrypts files and demands payment for access. Redirects users to malicious sites by altering DNS. Self-replicates across networks without user action.