Attacks Requiring Protection
 
 
Hacking Servers
- Access without permission or in excess of permission
 - Attractive because of the data they store
 
Hacking Clients
- Attractive because of their data or as a way to attack other systems by using the hacked client as an attack platform
 - Soft targets compared to servers; most users are security novices