Identify and define the four forms of attack methods that hackers use
For your initial response, list the four forms and provide an example of each attack.
Examples may be found in the text, but we suggest you do some internet research in order to find some other applications of attack methods.
Further, actual related attacks that truly happened are recommended in your research examples.
Provide examples of cyber defenses or remediation methods for each type of attack (again, using text and internet research).