Documenti analoghi: Analysis of Attempts To Penetrate Information Systems Over the Internet