Information security
CIA triad
Non-repudiation
Attacks that do not directly / actively engage with the target system(s). Examples:
- Searching google (googling)
- Network traffic analysis
Attacks that do directly / active engage with the target system(s). Examples:
- Brute forcing
- Sending malicious payloads
- Web app spidering
Attacks where the attacker is physically close to the target system.
Attacks where the attacker is inside of the organization / infrastructure. Examples:
- Shoulder surfing passwords
- Misusing privileged access
Information warfare