1. Where an attacker systematically tries all possible combinations of passwords in order to gain unauthorized access to a system.