Match the attack to the mitigation. Malware Spoofing Data compromise DDoS Ransomware Dictionary attack Brute Force Attack Installation of Unauthorized Software Cross Site Scripting Insider threat Intellectual property theft Dictionary attack Brute Force Attack Installation of Unauthorized Software Cross Site Scripting Insider threat.