Identifying Common Ways Hackers Use To Gain Access To Systems And Methods To Block Their Attacks