• Forms of attack:
    • malware
    • social engineering, e.g. phishing, people as the ‘weak point’
    • brute-force attacks
    • denial of service attacks
    • data interception and theft
    • The concept of SQL injection