Data leak | Denial of service | GPS/AIS jamming/spoofing | Human error | Intrusion | Legitimate access | Malfunction | Phishing | Physical hijack | Remote Access | Scam | Spearphishing | Undisclosed | Virus/Ransomware | Waterholing Attack | Website Compromission