Denial-of-service (DoS)and distributed denial-of-service (DDoS)attacks
🔺Man-in-the-middle (MitM)attack
🔺Phishing and spear phishing attacks
🔺Drive-by attack
🔺Password attack
🔺SQL injection attack
🔺Cross-site scripting (XSS)attack
🔺Eavesdropping attack
🔺Birthday attack
🔺Malware attack