Common Ways Hackers Use To Gain Access To Systems And How To Defend Against Them