A deliberate attempt to breach privacy or security.
See also: APPLICATION LAYER ATTACK, ATTACK SURFACE, ATTACK TREE, BICYCLE ATTACK, BLACK HAT ATTACK, BRUTE FORCE ATTACK, BUFFER OVERFLOW ATTACK, DEMONSTRATION ATTACK, DENIAL OF SERVICE, DIRECT ACCESS ATTACK, EAVESDROPPING ATTACK, FISHING ATTACK, GREY HAT ATTACK, INFERENCE ATTACK, INVERSION ATTACK, LINKAGE ATTACK, MAN-IN-THE-MIDDLE ATTACK, MASH ATTACK, MEMBERSHIP INFERENCE ATTACK, MODEL INVERSION ATTACK, MULTI-VECTOR ATTACKS, NETWORK LAYER ATTACK, OFFLINE DICTIONARY ATTACK, ORWELL ATTACK, PAPARAZZI ATTACK, POISONING ATTACK, RECONSTRUCTION ATTACK, REIDENTIFICATION ATTACK, REPLAY ATTACK, REVERSE FISHING ATTACK, SPOOFING ATTACK, SUBTRACTION ATTACK, SURNAME ATTACK, WEB SKIMMING ATTACK, WHITE HAT ATTACK, ZERO DAY ATTACK