The network attacks try to collect data and to check the vulnerabilities that can be later exploited to compromise the network in order to gain entry to the email accounts, databases, information...