What Are The Different Types Of Network Vulnerabilities?