Copyright 2002 by
Prentice Hall, Inc.
8-16
nApproaches hackers use:
nCracking the password
nTricking someone
nNetwork sniffing
nMisusing administrative tools
nPlaying middleman
nDenial of service
nTrojan horse
nViruses
nSpoofing
Security in the Internet Age: Hacking