A preliminary study shows that hackers penetrate systems in unique, documentable ways—just like criminals in the physical world.