The document discusses various types of cyber attacks including denial of service attacks, man-in-the-middle attacks, password cracking attacks, and social engineering attacks. Specific attack methods covered include TCP SYN floods, Smurf attacks, password brute force, and dictionary attacks. Defense strategies proposed include ingress filtering, disk quotas, firewalls, and intrusion detection systems.