Relier Pairs Malware and Cyber Attack Types Matching GameVersion en ligne Test your knowledge of malware and cyber attack types with this fun matching pairs game! par Spencer Carlson 1 Keylogger 2 Adware 3 RootKit 4 Brute Force Attack 5 Spyware 6 Virus 7 Trojan Horse 8 Worm 9 Zero-Day 10 Ransomware 11 Man-in-the-Middle Attack (MITM) 12 DDoS Attack 13 Botnet 14 Phishing 15 Backdoor 16 SQL Injection 17 Cross-Site Scripting (XSS) 18 DNS Spoofing 19 Social Engineering 20 Session Hijacking Manipulates people into compromising security. Steals active session data to impersonate users. Disguises itself as legitimate software to gain access. Self-replicates across networks without user action. Targets vulnerabilities not yet patched. Hides deep in systems to evade detection and control. Encrypts files and demands payment for access. Network of infected devices for large-scale attacks. Records keystrokes to capture sensitive info. Attaches to files, spreads when files are executed. Collects user information secretly, often for advertising. Tries numerous password combinations to gain access. Tricks users into sharing sensitive info via fake sites. Overloads systems to cause unavailability. Displays unwanted ads, can slow systems down. Intercepts communication for data theft. Injects scripts into web pages to compromise users. Bypasses security for unauthorized remote access. Manipulates database queries to steal data. Redirects users to malicious sites by altering DNS.