IT questions?
1. Consider the statement: an individual threat agent, like a hacker, can be a factor in
more than one threat category. If a hacker hacks into a network, copies a few files,
defaces the Web page, and steals credit card numbers, how many different threat categories
does this attack fall into?
2. Using the Web, research Mafiaboy’s exploits. When and how did he compromise sites?
How was he caught?
3. Search the Web for the “The Official Phreaker’s Manual.” What information contained
in this manual might help a security administrator to protect a communications
system?