This part discusses some of the most common ways an intruder can
breach computer systems or intercept data in transit. This part also
details some of the most commonly used services and their associated port
numbers, which can be useful to administrators looking to mitigate the
risks of being cracked.