Case Study | Types of Cyber Attacks