Your latest cybersecurity education video on defining threat actors and possible attacks gave the CIO a brilliant idea. She wants you to create a training guide on the various forms of malware to help train junior technicians in the IT department pass their upcoming certification.Create a table that can be utilized as a training guide that identifies, summarizes, and provides characteristics of at least ten different types of attacks and/or malware (to include DOS and DDOS attack).Prepare this assignment according to the guidelines found in the APA Style Guide.3-5 scholarly sources