1. Viruses : Computer programs written by devious programmer and design to replicate themselves and infect computers when triggered by specific event.
2. Trojan horse programs : Delivery vehicles for destructive code, which appear to be harmless or useful software programs such as games.
3.Vandals -. Software applications or applets that cause destruction
4. Attack : Including Reconnaissance attacks (info -gathering activities to collect data that is later use to compromised the networks);
access attack (exploit network vulnerability in order to gain entry to e-mail,database or the corporate network;
5.Denial – Of – Service attack ( which all hacker to shutdown or crash the server)
6. Data Interception : Involves eavesdropping on communications or altering data packets being transmitted.
7. Social Engineering : Obtaining Confidential network security information through nontechnical means, such as posing as a technical support person and asking for people’s password.