Information Security

⌘K
  1. Home
  2. Docs
  3. Information Security
  4. Intrusion Detection and P...
  5. Introduction to Intruder

Introduction to Intruder

An intruder is an individual or program that gains unauthorized access to computer systems or networks with malicious intent.

  • It can be external attackers (outsiders) or malicious insiders. Their actions may include stealing data, launching attacks, installing malware, or disrupting services.

Types:

  • Masquerader: External person using false identity.
  • Misfeasor: Legitimate user misusing access.
  • Clandestine User: Gains control and hides their presence.

How can we help?

Leave a Reply

Your email address will not be published. Required fields are marked *