This part discusses some of the most common ways an intruder can
breach computer systems or intercept data in transit. This part
also details some of the most commonly used services and their
associated port numbers, which can be useful to administrators
looking to mitigate the risks of being cracked.