Involve monitoring the transmission data of an organization. These threats are difficult to detect because they do not involve alteration of the data
Involve some modification of the data stream or the creation of a false stream. These threats are most successful when directed at the weakest link in the overall system, namely, at the host level