Property: Unauthorized use of intellectual property like songs, stories, image, logos, colors, etc.
|
Individual: Spamming, malware, spoofing, and phishing attacks
|
Enterprise: Trojan Horse, Distributed Denial of Service (DDoS), server hacks, and salami attacks
|