Explain how hackers gain unauthorized access to individuals’ computers.

Description

Requirement: Use INTERNET to conduct a short research about how hackers gain unauthorized access to individuals’ computers. Your discussion will focus on three main phases in human break-ins (hack): Scanning Phase, The break-in and After the break In.

Purpose: It is to enable students illustrate various phases which allow hackers gain unauthorized access to individuals’ electronic devices.

Assignment (report) guidelines are as follows:

1. Use Time New Roman.

2. Use Font Size 12.

3. Use 1.15 Line Spacing.

4. Paragraph is justified.