Vulnerability exploitation: the problem of protecting our weakest linksFurnell SMComputer Fraud & Security, November, pp12-15, 2003