Privilege Escalation Attacks | Types, Examples and Defence