This document analyzes information system security, focusing on various types of attacks and countermeasures necessary to protect sensitive data in today's digital landscape. It categorizes attacks into passive and active types, detailing methods such as eavesdropping, data modification, and denial of service, along with real-world examples of recent data breaches in India. The study emphasizes the importance of identification, authentication, and authorization as critical elements in safeguarding information systems against these evolving cyber threats.