A network attack where the hacker attempts to change data or introduce a malware.
When a hacker monitors data travelling on a network (without changing the data).
A network attack which involves overloading a network with useless traffic to make the network slow or unresponsive.
When a hacker or automated software generates thousands of usernames/passwords to try to access a computer system.
A network attack performed by someone whithin the organisation, using their network access to steal or change information.