Injection attacks occur when languages work with each other to produce a system that can serve millions of users simultaneously. Each language has its own rules and syntax, which can conflict with each other based on the symbols meaning. Being able to protect from this type of attack is essential to a pleasant online experience.
Data store attacks attempt to compromise the data stored in your databases or files. This is the most consequential attack since privacy is the policy of most website owners. Once the store is successfully penetrated, the privacy is at the hands of the hacker.
Authentication attacks require more patience from a dedicated hacker. What can the user learn from incorrect log in or sign up? This attack is usually followed by access level attacks where the user tries to get granted access to privileged information.