-
Methods
-
Sabotage
-
Internal
- Planting a Mole
- Disgruntled Employee
-
External
- Activists
- Terrorist Groups
- State Actors
-
Website Defacement
- Send Message
- Publicity
-
Denial of Service
- Deter Communication
- Suspend System Activity (permanently or temporarily)
-
Technology
-
Wired
-
Internet
-
Exploiting Defaults
- Faulty IIS (Internet Information Service)
- Data Mining
- Authorization Bypass
-
Software
- Trojan Horse
- Virus
- Worm
- Hardware
-
Stealing Password
- Dictionary Attacks
- Hybrid Attacks
- Brute Force Attacks
-
Email
-
Man-in-the-Middle
- Phishing
- DNS hijacking
- URL manipulation
-
Wireless
- Eavesdropping
- Interference
- Packet Sniffing