Breach of data security: |
Information stored on network or computers is altered by attackers. |
Breach of operations security: |
Attackers take advantage of vulnerabilities within daily procedures to access or alter information through methods like password sniffing. |
Breach of personnel security: |
Sensitive company information is gained from an employee by attackers |
Breach of communication security: |
Information is being intercepted or altered on the way across a network. |
Breach of physical security: |
Attackers gain access to a building or to computer/networking hardware. |