Changes in Intrusion Profile and Attack Sophistication
exploiting know vulnerabilities
exploiting know vulnerabilities
exploiting protocol flaws
examining source files for new security flaws
abusing anonymous FTP, web servers, email
installing sniffer programs
IP source address spoofing
distributed denial of service attacks
widespread, automated scanning of the Internet