What is an intruder in cyber security? Full explanation.



What is an intruder?

Intruder attacks range from the benign to the serious.At the benign end of the scale,there are many people who simply wish to explore internet and see what is out there.At the serious end are individuals who are attempting to read privileged data.perform unauthorized modifications to data,or disrupt the system.One of the two most publicized threats to security is the intruder.Other is viruses,often referred to as a hacker or cracker.

Types of Intruder

(1) Masquerader

(2) Misfeasor

(3) Clandestine user


-Masquerader

Masquerader is likely to be an outsider.

An individual who is not authorized to use the computer and who enter in a system access controls to exploit a legal user's account.


-Misfesor

Misfesor generally is an insider.

A legal user who accesses data,program,or resources for which such access is not authorized  for such access but misuses his or her privileges.


-Clandestine user

Clandestine user can be either an outsider or an insider.

An individual who take supervisory control of the system and uses this control to evade auditing and access controls or to suppress audit collection.


List the following examples of intrusion.

(1) Defancing a web server.

(2) Performing a remote root compromise of an e-mail server.

(3) Guessing and cracking passwords.

(4) copying a database containing credit card numbers.

(5) Viewing sensitive data,inclding payroll records and medical information,without authorization.

(6) Using an unattended,logged-in workstation without permission.



No comments:

Post a Comment