In a tabular form, provide a minimum 5 paged detailed analysis indicating the metrics and parameters that differentiate each of the attacks listed below from each other:
Please, make sure to reference CAPEC as well,
a)Access to sensitive information,
b)Man-in the Middle
c)Evil Twin
d)Eavesdropping
e)Denial of Service
f)Spoofing
g)Access to data logs,
h)Examine communication protocols for vulnerabilities