i)Logic bomb: This is malicious software that is triggered by the time.
ii)Spoofing: It is also known as cyberwar. This is sending a web link to an address
different from the intended one. The site camouflages as the intended destination.
iii)Sniffing: It is the process of eavesdropping using a program that monitors data
transmission over a network.
iv)Spamming: It is sending unsolicited mail to a group of internet users who have
expressed no interest in the product or service being
marketed.
v)Salami attack: This refers to use of a program to alter data in one computer system or location by a little margin and add the difference on another data stack in another computer system or location. For example, the amount of
cents in banker’s accounts can be transferred to another account. The account holder may hardly notice that the cents are
missing.