We can break the broad division of security threats, also known as exploits, into categories:
- Remote exploit
- The attacker connects to the machine via the network and takes advantage of bugs
or weaknesses in the system.
- Local attack
- The attacker has an account on the system in question and can use that account to
attempt unauthorized tasks.