Eavesdropping Attack
(Release of Message Contents)
Data Modification Attack
(Modification of Messages)
IP, MAC, DHCP Spoofing Attack
(Masquerade)
Password-Based Attacks
Denial-of-Service Attacks
Man-in-the-Middle Attack
Compromised-Key Attack
Sniffer Attack
Password Attack
Trust Exploitation
Port Redirection
Buffer Overflow
Pretexting
Phishing
Spear Phishing
Tailgating
Something for Something
(Quid pro quo)
Baiting
Maliciously Formatted Packets
Overwhelming Quantity of Traffic
Ping of Death
(legacy)
Smurf Attack
(legacy)
TCP SYN Flood Attack
Distributed DoS Attack
(DDoS)