Remote and local attacks

We can break the broad division of security threats, also known as exploits, into categories:

Remote exploit
The attacker connects to the machine via the network and takes advantage of bugs or weaknesses in the system.
Local attack
The attacker has an account on the system in question and can use that account to attempt unauthorized tasks.