Hi!
When someone repeatedly compares passwords to lists of common words, this is known as the dictionary attack.
We call it this because they are <em>literally </em>using a dictionary to attack you!
Hopefully, this helps! =)
Of course there is. On a simple level, consider a parent trying to locate their missing child. Someone might break into their social media accounts to see if there are messages that might help determine their whereabouts.
Consider a website hosting inappropriate pictures of children. Breaking into the server hosting the files and removing them is 100% ethical.
I'm sure you can think of more examples.
Experiments. ...
Surveys. ...
Questionnaires. ...
Interviews. ...
Case studies. ...
Participant and non-participant observation. ...
Observational trials. ...
Studies using the Delphi method.
Dynamic Host Configuration Protocol, also known as DHCP.