An attempt to overcome the security provisions of the network of a computer network. Attacks can be active attacks which alter the data stored on the network or data being communicated within a network; for example, deleting a critical file, or passive attacks which just read data, usually data that is transmitted along some communication medium.