Answers
Data is read in transit by an attacker
Malicious Software
All possible combination for passwords are attempted
Emails are sent out impersonating a person or company in order to gain someones trust
Flooding a server with requests so no one else can access it
Using people as the weakness in a security system