1. Methods
    1. Sabotage
      1. Internal
        1. Planting a Mole
        2. Disgruntled Employee
      2. External
        1. Activists
        2. Terrorist Groups
        3. State Actors
    2. Website Defacement
      1. Send Message
      2. Publicity
    3. Denial of Service
      1. Deter Communication
      2. Suspend System Activity (permanently or temporarily)
  2. Technology
    1. Wired
      1. Internet
        1. Exploiting Defaults
          1. Faulty IIS (Internet Information Service)
        2. Data Mining
        3. Authorization Bypass
      2. Software
        1. Trojan Horse
        2. Virus
        3. Worm
      3. Hardware
      4. Stealing Password
        1. Dictionary Attacks
        2. Hybrid Attacks
        3. Brute Force Attacks
      5. Email
        1. Man-in-the-Middle
          1. Phishing
          2. DNS hijacking
          3. URL manipulation
    2. Wireless
      1. Eavesdropping
      2. Interference
      3. Packet Sniffing