SQL Injection Attack
OPC/DCOM Attack
Back Door Attack Through Internet
Back Door Attack Through Access Point
Man-in-the-Middle Attack