Explain in detail different types of intruders
Answers
Answered by
0
a first basically this person who intrudes, especially into a building with criminal intent.
sers or external perpetrators.
—Types of Intrusions:
◦External attacks
– attempted break-ins, denial of service attacks, etc.
◦Internal attacks
–Masquerading as some other user
–Misuse of privileges, malicious attacks
◦Clandestine users: exploiting bugs in privileged programs
Types of intruders:
◦Masquerader : pretend to be someone one is not
An individual who is not authorized to use the computer and who penetrates a system’s access controls to exploit a legitimate user’s account
◦Misfeasor : authentic user doing unauthorized actions
A legitimate user who accesses data, programs, or resources for which such access is not authorized, or who is authorized for such access but misuses his or her privileges
◦Clandestine user : done secretively, especially because illicit
An individual who seizes supervisory control of the system and uses this control to evade auditing and access controls or to suppress audit collection
Mechanisms Used:
—Prevention: isolate from network, strict authentication measures, encryption—Preemption:
◦“do unto others before they do unto you”—Deterrence: dire warnings,
◦“we have a bomb too.”—Deflection: diversionary techniques to lure away—Detection—Counter attacks
Detection : is concerned with learning of an attack, either before or after its success.Prevention : is a challenging security goal. The difficulty stems from the fact that the defender must attempt to thwart all possible attacks, whereas the attacker is free to try to find the weakest link in the defense chain and attack at that point
sers or external perpetrators.
—Types of Intrusions:
◦External attacks
– attempted break-ins, denial of service attacks, etc.
◦Internal attacks
–Masquerading as some other user
–Misuse of privileges, malicious attacks
◦Clandestine users: exploiting bugs in privileged programs
Types of intruders:
◦Masquerader : pretend to be someone one is not
An individual who is not authorized to use the computer and who penetrates a system’s access controls to exploit a legitimate user’s account
◦Misfeasor : authentic user doing unauthorized actions
A legitimate user who accesses data, programs, or resources for which such access is not authorized, or who is authorized for such access but misuses his or her privileges
◦Clandestine user : done secretively, especially because illicit
An individual who seizes supervisory control of the system and uses this control to evade auditing and access controls or to suppress audit collection
Mechanisms Used:
—Prevention: isolate from network, strict authentication measures, encryption—Preemption:
◦“do unto others before they do unto you”—Deterrence: dire warnings,
◦“we have a bomb too.”—Deflection: diversionary techniques to lure away—Detection—Counter attacks
Detection : is concerned with learning of an attack, either before or after its success.Prevention : is a challenging security goal. The difficulty stems from the fact that the defender must attempt to thwart all possible attacks, whereas the attacker is free to try to find the weakest link in the defense chain and attack at that point
Similar questions