Forms of attack: malware social engineering, e.g. phishing, people as the ‘weak point’ brute-force attacks denial of service attacks data interception and theft The concept of SQL injection