The document discusses various types of cyber attacks including spamming, spoofing, denial-of-service (DoS) attacks, and distributed denial-of-service (DDoS) attacks. It defines spamming as flooding the internet with unsolicited messages. Spoofing involves falsifying data to masquerade as another identity. DoS attacks aim to make online services unavailable by overloading them with traffic. DDoS attacks involve generating traffic from multiple sources in a coordinated way to cause even more disruption. The document provides examples and defenses for each type of attack.