This document discusses security attacks on the RSA cryptosystem from a computational number theoretic approach. It covers factorization attacks using algorithms like Fermat's method, Euler's method, Pollard's p-1 method and Pollard's rho method. It also discusses elementary attacks like dictionary attacks and common modulus attacks. Finally, it discusses low private exponent attacks using Wiener's attack. The document analyzes the impact of these attacks on the security of RSA and explores the relationship between breaking RSA versus integer factorization.