Slide 17 of 22
Notes:
Proving unauthorised access or criminal damage is difficult.
Would include cracking book, macro virus(!) password lists.
Must show that intended to use the ‘thing’ to cause damage.