The intruder (also Know as Attacker ) is the first element in the attack model.An intruder is a person who attempt to gain unauthorized access to a system ,to damage that system ,or to disturb data on that system .in summary ,this person attempts to  violate security by interfering with system availability ,data integrity or data
confidentiality .

Intro and their Activities can be categorized as follows.



Black Hat Hacker

Black Hacker
A black hat ( also called a cracker or Dark side hacker) is a person who uses his skill with computers and other technological items in a malicious or criminal manner.



Hacker Spies supported by Government

Hacker Spies



 These are hackers supported by government Organizations to get into enemy system for info Gathering 


Cyber terrorist 

Cyber terrorist




  Cyber terrorist attack the computers and info system of their enemies to cause physical ,real-world harm or server disruption with the aim of Advancing the Attacker,s own Political or religious goals.


Corporate Spies 


Corporate Spies



These kind of intruders are funded by  corporate agencies to get into system of market rivals and perform various action like info gathering on upcoming projects. research and development work ,Defacing of websites ,bringing down critical services ,etc.


Professional Criminals  


Professional Criminals


These intruder target the financial ( Including Commerce ) targets.Their Activities include Transferring funds illegally from banks and other financial organizations ,getting hold of customer info like credit card details , social security numbers,etc


Vandals


Vandals

Vandals Are intruders without any specific goals or motives.Their only aim to produce as much damage as possible to the target system .    



Thank You :)

0 comments:

Post a Comment

Powered by Blogger.