A video lecture on
1. Passive Attacks
1.1 Release of Message Contents
1.2 Traffic Analysis
2. Active Attacks
2.1 Modification
2.2 Masquerading
2.3 Replay
2.4 Repudiation
2.5 Denial of Service (DoS)
3. Security Attacks
3.1 Interception
3.2 Interruption
3.3 Modification
3.4 Fabrication