Computer Security Fundamentals by Chuck Easttom Chapter 6 Techniques Used by Hackers © 2012 Pearson, Inc. Chapter 6 Techniques Used by Hackers © 2012 Pearson, Inc.…