Correct Answer : All of the Above
Explanation :
Attacks are Phishing, SQL Injections, and Password Attack.
Phishing : The attacker sends a large number of fraudulent emails and gains access to the system.
SQL Injections : The attacker gains access to the protected information by adding malicious code to the SQL server.
Password Attack : Attackers gain access to the passwords unethically and gain access to the confidential data.