Operating system attacks
attackers always search for OS vulnerabilities (buffer overflow, OS bugs, unpatched OS)
Application level attacks
overflow, active content, cross-site script (XSS), DoS, SQL injection, session hijacking, phishing
Shrink Wrap Code Attacks
exploiting holes in unpatched or poorly configured software you buy and install
Misconfiguration attacks
target: poorly configured service or device; weak default settings