Define the type of attack in each of the following cases:
- a) A student breaks into a professor’s office to obtain a copy the next test.
- b) A student gives a check of RM10 to buy a used book. Later the student finds out that the check was cashed for RM100.
- c) A student sends hundreds of e-mails per day to the school using a phony return e-mail address.
</pclass=”msonormal”>