Description
Requirement: Use INTERNET to conduct a short research about how hackers gain unauthorized access to individuals’ computers. Your discussion will focus on three main phases in human break-ins (hack): Scanning Phase, The break-in and After the break In.
Purpose: It is to enable students illustrate various phases which allow hackers gain unauthorized access to individuals’ electronic devices.
Assignment (report) guidelines are as follows:
1. Use Time New Roman.
2. Use Font Size 12.
3. Use 1.15 Line Spacing.
4. Paragraph is justified.