First page Back Continue Last page Overview Graphics
Types of threats
Interception
- A perpetrator hijacks or takes control
Interruption
- A perpetrator prevents the normal operation.
Modification
- Alteration of data or assets to something else
Fabrication
- Insertion of network data or transactions.