. . . . . . "In some situations, it may also be possible for the attacker to directly gain access to and damage or destroy computer programs, files, data or other network resources, such as by learning a user name and password to gain access to a network." . .