ABSTRACT

The problem of people breaking into computer and telephone systems is not new. Such activities have occurred since the introduction of these technologies. As new technologies become available, it can be expected that new methods of obtaining unauthorized access to these technologies will be developed.