Application Security

In a tabular form, provide a minimum 5 paged detailed analysis indicating the metrics and parameters that differentiate each of the attacks listed below from each other:

Please, make sure to reference CAPEC as well,

a)Access to sensitive information, 

b)Man-in the Middle

c)Evil Twin

d)Eavesdropping

e)Denial of Service

f)Spoofing

g)Access to data logs, 

h)Examine communication protocols for vulnerabilities