Computer hackers choose their victims carefully.

  • They gather information about their targets, looking for a weak link.
  • They exploit the weaknesses to gain access.
  • Hackers can steal or change files, change passwords, or cause other damage.

Sniffers, password cracking tools, and Denial of Service (DoS) attacks can debilitate a network.