Computer Science Homework Help

Grand Canyon University Malware DOS and Web Attacks Paper

 

Your latest cybersecurity education video on defining threat actors and possible attacks gave the CIO a brilliant idea. She wants you to create a training guide on the various forms of malware to help train junior technicians in the IT department pass their upcoming certification exam.

Create a table that can be utilized as a training guide that identifies, summarizes, and provides characteristics of at least ten different types of attacks and/or malware (to include DOS and DDOS attack).