Analyze attributes of various types of malware and other attacks to determine the key characteristics of each type.
Examples: virus, worm, brute force, backdoor, spyware, remote access tool (RAT)