Java boasts predefined classes that can help hackers in their quest to modify a system. Such classes have the capability of deleting files, modifying files, modifying memory to name but a few. Using these classes makes java very powerful, resulting in a huge potential for abuse. For a hacker to modify a system it requires them to intrude into the system, as java is designed to work on many platforms it is ideal for a hacker that wants to cause problems for everybody. Java defensive of this attack is Strong.
2. Invasion of Privacy v/s For people that value their privacy, this type of attack will particularly affect them. This type of attack is caused by malicious applets. Information could be sent from one machine to another without the user whose information it is ever finding out. The creator could target information such as financial, email and personal documents. For others to find out this information out could particularly damaging if a competitor is sent data about another company. A common way for these attacks to occur is by forging emails, and actually hacking into an external network. If a computer has sufficient hardware and software to record and to play sound, it would be possible for a hacker to not only listen in to a users conversation, but to also record and copy the conversation. Java defensive of this attack is Strong, although the consequences are thought to be only moderate.
3. Denial of Service v/s This is also a serious attack, but not severely and is implemented again by a malicious applet. This type of attack is designed to bring your system to a standstill, probable cure to solve problem would be to reboot your system. This would result in unsaved work from the time of the attack to be lost. A hacker may cause this attack in many ways; probably most common would be to create thousands of windows to appear on the screen. Basically all these types of attacks are designed to exhaust the system of its resources.