answersLogoWhite

0

Because they have a lot of private computers networked together. The university does not have control of the private computers, so they may or may not have firewalls. This leads to the situation where you only need to hack a relatively public network, and you have access to potentially thousands of unprotected computers.

User Avatar

Wiki User

16y ago

What else can I help you with?

Related Questions

What is phase of hacking where the attacker creates a profile of the target?

spoofing


What are the arguments against internet voting?

Some of the arguments against internet voting include security risks, electronic and human errors.


Which Which pre-hacking phase could be accomplished without the attacker ever connecting to the target network?

Foot-printing is the pre-hacking phase that could be accomplished without the attacker ever connecting to the target network.


The phase of hacking where the attacker creates a profile of the target is known as and is also referred to as?

foot-printing, reconnaissance


What is hakcing?

Hacking is a way to breaching the security of your Target Computer for your miscellaneous use.or for getting information.and getting your target computer controls on your hand.


Which pre-hacking phase could be accomplished without the attacker ever connecting to the target network?

Foot-printing is the pre-hacking phase that could be accomplished without the attacker ever connecting to the target network.


Why do predators tend to target the old the young and the sick?

They are easier to catch.


Is a Macy's or Target department store credit card easier to get?

macys


Correct order of the three pre-hacking phases?

foot-printing, enumeration, and scanning


Is it harder to hit a target with a shotgun than a pistol?

If the target is stationary, it is much easier to hit with a shotgun. But in most normal hunting usages for shotgun, the target is moving, and this requires learning how to "lead" the target, which takes practice.


What is the correct order f the three pre hacking stages?

The correct order of the three pre-hacking stages is reconnaissance, scanning, and gaining access. During reconnaissance, attackers gather information about the target to identify potential vulnerabilities. This is followed by scanning, where they use various tools to probe for open ports and services. Finally, gaining access involves exploiting identified vulnerabilities to infiltrate the target system.


Is there such thing as harmless hacking?

Yes, if you work on the Federal Government.