1.An attack that mimics your MAC address to enter your network
2.An attack that denies service to your router
3.An attack that creates a mock website to trick a user into divulging secure information
4.An attack that copies all of the files from your router to a secondary hard drive on a hacker computer and then harvests information continuously on your browsing activity