A catalogue every type of identity attack, outlining what identity attacks are possible for all data sources, for cloud, and for on-premises