Requirement:
Use internet to conduct a short research about how hackers gain unauthorized access to individuals’ computers. Your discussion will focus on three main phases in human break-ins (hack): Scanning Phase, The break-in and After the break In.