Exhibit 12.1 lists common techniques used to commit cybercrimes. For each of these techniques, research the Internet and provide the names of one or two entities that have been impacted by such technique in the last 5–7 years. Briefly describe how the technique was used in the attack. List information, screenshots, reports, etc. that the IT auditor would likely request from a client in order to conduct an information security audit. Why is this information important for the IT auditor?