Types of access control attacks