Types of Hardware Attacks