There are a number of threats to a security system. The threats are intended to break or bypass the security system and gain access to whatever is being protected. Some of the threats are: Code scanning: also called a brute force attack, code scanning is where an attacker tries every possible key to gain access to the system. Code grabbing: this is where an attacker records a legitimate transmission and replays that transmission to gain access. Copy-paste attack: an attacker records a transmission, replaces part of the transmission with their own data and sends the modified transmission to gain access. Encryption attack: if an attack can be successfully made upon the encryption algorithm, the system is vulnerable. Physical attack: if a portion of the system can be physically accessed or stolen, the system may be vulnerable. For example, if someone steals a car keyfob, it may be compromised by the threat’s physical access to the hardware no matter how secure the link is.