Thursday, 2 February 2012

14th- How does INTRUDERS pose a threat to the Information System?

INTRUDERS

Anyone who accesses equipment, electronic data, or files without proper authorization is an intruder.
Intruders who attack information systems for fun and challenge are known as hackers.


Other types:


  • Unnoticed Intruders
A hacker might break into and either pilfer or damage the company's Web site.
  • Wiretappers
These lines are vulnerable to wiretapping, which may be done with even inexpensive devices that are capable of performing the task without giving any clues that the wire is being tapped.
  • Piggybackers
With this method,the penetrator intercepts legitimate information and substitutes fraudulent information in its place.
  • Impersonating  Intruders
Individuals who pose as someone else in order to defraud the company.
  • Eavesdroppers
Standard cathode-ray tubes (CRTs) used in common video display units emit electromagnetic interference (EMI) on a frequency capable of being picked up by an ordinary television set.

    1 comment:

    1. I am really impressed by this blog! Very clear explanation of issues and It Is Given IS open to everyone. accounting software

      ReplyDelete