Matching Pairs Malware and Cyber Attack Types Matching GameOnline version Test your knowledge of malware and cyber attack types with this fun matching pairs game! by Spencer Carlson 1 Virus 2 Session Hijacking 3 Spyware 4 Adware 5 Trojan Horse 6 Botnet 7 Zero-Day 8 Ransomware 9 Man-in-the-Middle Attack (MITM) 10 SQL Injection 11 DNS Spoofing 12 RootKit 13 Cross-Site Scripting (XSS) 14 Backdoor 15 DDoS Attack 16 Social Engineering 17 Brute Force Attack 18 Phishing 19 Keylogger 20 Worm Self-replicates across networks without user action. Redirects users to malicious sites by altering DNS. Collects user information secretly, often for advertising. Manipulates database queries to steal data. Injects scripts into web pages to compromise users. Records keystrokes to capture sensitive info. Bypasses security for unauthorized remote access. Tries numerous password combinations to gain access. Disguises itself as legitimate software to gain access. Overloads systems to cause unavailability. Intercepts communication for data theft. Targets vulnerabilities not yet patched. Steals active session data to impersonate users. Hides deep in systems to evade detection and control. Displays unwanted ads, can slow systems down. Encrypts files and demands payment for access. Manipulates people into compromising security. Attaches to files, spreads when files are executed. Network of infected devices for large-scale attacks. Tricks users into sharing sensitive info via fake sites.