Impersonation and identity theftTechnical, procedural, and physical accessTechnical controlsAccess controlsDiscretionary access controlMandatory access controlRole-based access controlProcedural controlsPhysical controlsCreating vulnerabilities to compromise systemsVulnerable systemExploit for the recovered vulnerabilityThe motivation of the attackerCreating vulnerabilitiesIncrease the attack surface using sensitive dataCreating entry points and botsZombies and botnetsSummary