The intruder (also Know as Attacker ) is the first element in the attack model.An intruder is a person who attempt to gain unauthorized access to a system ,to damage that system ,or to disturb data on that system .in summary ,this person attempts to  violate security by interfering with system availability ,data integrity or data
confidentiality .

Intro and their Activities can be categorized as follows.



Black Hat Hacker

Black Hacker
A black hat ( also called a cracker or Dark side hacker) is a person who uses his skill with computers and other technological items in a malicious or criminal manner.



Hacker Spies supported by Government

Hacker Spies



 These are hackers supported by government Organizations to get into enemy system for info Gathering 


Cyber terrorist 

Cyber terrorist




  Cyber terrorist attack the computers and info system of their enemies to cause physical ,real-world harm or server disruption with the aim of Advancing the Attacker,s own Political or religious goals.


Corporate Spies 


Corporate Spies



These kind of intruders are funded by  corporate agencies to get into system of market rivals and perform various action like info gathering on upcoming projects. research and development work ,Defacing of websites ,bringing down critical services ,etc.


Professional Criminals  


Professional Criminals


These intruder target the financial ( Including Commerce ) targets.Their Activities include Transferring funds illegally from banks and other financial organizations ,getting hold of customer info like credit card details , social security numbers,etc


Vandals


Vandals

Vandals Are intruders without any specific goals or motives.Their only aim to produce as much damage as possible to the target system .    



Thank You :)

Related Posts:

  • How to stop Virus Attack Viruses are Dangerous software that can cause great damage to your system.The antivirus software can protect your system from Virus,however at time they may not detect the new viruses .The best way to protect your sys… Read More
  • How to Avoid Phishing Attacks phishing a technique used by cyber criminal who try steal your confidential info by pretending to be someone you trust.For example, you may receive an email that seems to have been sent by your bank asking for your ac… Read More
  • Introduction Type of Hacker The intruder (also Know as Attacker ) is the first element in the attack model.An intruder is a person who attempt to gain unauthorized access to a system ,to damage that system ,or to disturb data on that system .in s… Read More

0 comments:

Post a Comment

Powered by Blogger.