First page Back Continue Last page Overview Graphics
Types of threats
- Interception- A perpetrator hijacks or takes control
 
- Interruption- A perpetrator prevents the normal operation.
 
- Modification- Alteration of data or assets to something else 
 
- Fabrication- Insertion of network data or transactions.