Use the Web to search for examples of hacks that made the news.
Write a brief description of the attack indicating what type of hack was involved.
Post between 200 and 300 words.
Read Chapter 6 of the Easttom text, Techniques Used by Hackers
Text book : Easttom, Chuck. Computer Security Fundamentals, (Third Edition). Indianapolis: Pearson, 2016. ISBN-13: 978-0-7897-5746-3
DEFCON – Careers in Cyber Security
Click HERE to watch or click embedded video below.