This document defines and describes various methods of cybersecurity attacks. It discusses adware, backdoors, bots, brute force attacks, buffer overflows, clone phishing, crackers, denial-of-service attacks, exploit kits, firewalls, keystroke logging, logic bombs, malware, master program, phishing, phreakers, rootkits, shrink wrap code, social engineering, spam, spoofing, spyware, SQL injection, threats, and Trojans. The document provides a concise definition or description of each cybersecurity attack method in 1-2 sentences.