The document defines different types of attacks on cryptography systems including passive and active attacks. Passive attacks attempt to learn information without affecting system resources, while active attacks try to alter system operations. The document also discusses cryptography, defining it as the practice of hiding information and converting plain text into unintelligible cipher text. Symmetric key cryptography uses a shared key for encryption and decryption, while asymmetric key cryptography uses public and private key pairs.