Answers
All possible combination for passwords are attempted
Malicious Software
Emails are sent out impersonating a person or company in order to gain someones trust
Data is read in transit by an attacker
Using people as the weakness in a security system
Flooding a server with requests so no one else can access it