5 Attack Types
Define Passive Attacks
Gleaning of available information without attempting any sort of manipulation.
Define Active Attacks
Manipulating or compromising of system.
Define Close-in Attacks
Moving to a place of proximity (typically physical) for gleaning of information
Define Insider Attacks
A trusted agent abuses that organizational trust
Define Pod Slurping
Exfiltration of data via PED (such as iPod)
Define Distribution Attacks
Embedding attacks into the supply chain for a vendor product