|Breach of data security:
||Information stored on network or computers is altered by attackers.
|Breach of operations security:
||Attackers take advantage of vulnerabilities within daily procedures to access or alter information through methods like password sniffing.
|Breach of personnel security:
||Sensitive company information is gained from an employee by attackers
|Breach of communication security:
||Information is being intercepted or altered on the way across a network.
|Breach of physical security:
||Attackers gain access to a building or to computer/networking hardware.