enabled – Which software and version is used • Sniffing – Monitoring data (e.g. passwords) in transit • Break-in – Gain access to a computer, preferably as superuser
Prevent legitimate users from working – Usually done by crashing or overloading the system or network • Distributed Denial of Service (DDoS) – DoS attack from many different sources simultaneously