1 Table of Contents: ...People-A Security Problem -- Tools -- Attacks -- Poor Security Practices -- People as a Security...