The concept of a “Vulnerability”
Buffer overflow
Protocol/bandwidth interactions
Protocol elements which do no work
“execute this” messages
The special case of “mobile agents”
Human user vulnerabilities
eMail worms
Phishing