Attacks Requiring Protection
Hacking Servers
- Access without permission or in excess of permission
- Attractive because of the data they store
Hacking Clients
- Attractive because of their data or as a way to attack other systems by using the hacked client as an attack platform
- Soft targets compared to servers; most users are security novices