1. If an attacker breaks into a corporate database, modifies some information and deletes critical files, against what security goal or goals is this attack aimed?
2. If you accidentally find someone's password and use it to get into a system, is this hacking? Explain.
3. Why do you think DoS attackers use zombies to attack victims instead of sending attack packets directly to victims? Come up with two reasons.
4. What do you think are the pros and cons of paying off extortionists?