|
Computer hackers choose their victims carefully.
- They gather information about their targets, looking for a weak link.
- They exploit the weaknesses to gain access.
- Hackers can steal or change files, change passwords, or cause other damage.
Sniffers, password cracking tools, and Denial of Service (DoS) attacks can debilitate a network.
|