Types of Intruders
Intruders are divided into three categories:
- Masquerader: The category of individuals that are not authorized to use the system but still exploit users’ privacy and confidential information by possessing techniques that give them control over the system, such category of intruders is referred to as Masquerader. Masqueraders are outsiders and hence they don’t have direct access to the system, their aim is to attack unethically to steal data/ information.
- Misfeasor: The category of individuals that are authorized to use the system, but misuse the granted access and privilege. These are individuals that take undue advantage of the permissions and access given to them, such category of intruders is referred to as Misfeasor. Misfeasors are insiders and they have direct access to the system, which they aim to attack unethically for stealing data/ information.
- Clandestine User: The category of individuals who have supervision/administrative control over the system and misuse the authoritative power given to them. The misconduct of power is often done by superlative authorities for financial gains, such a category of intruders is referred to as Clandestine Users. A Clandestine User can be any of the two, insiders or outsiders, and accordingly, they can have direct/ indirect access to the system, which they aim to attack unethically by stealing data/ information.
Intruders in Network Security
Pre-Requisite: CyberSecurity
Cyber Security is the branch of technology that deals with the security of using the internet. Technology is an essential part of today’s generation, it is hard to imagine our lives without technology. Thus, it is essential that the technology we use in our daily lives is extremely secure and safe. Cyber technology is the branch of technology, that takes care of this need.
Contact Us