Monday, January 28, 2013

Briefly Explain Two (2) Types Of Intruders Creatively And Innovatively



Intruders define is anyone who accesses equipment, electronic data, or file without proper authorization. However, the intruders who attack information systems for fun and challenge are known as hackers. There are many type of intruders include unnoticed intruders, wiretappers, piggybackers, impersonating intruders and eavesdroppers.


There are two types of Intruders that famous is :-

1) Impersonating Intruders 


Impersonating intruders are individuals who pose as someone else in order to defraud the company. One type of intruder use an illegally obtained user ID and password to access the company's electronic resources. Many companies are very lax about security over user IDs and password. In some cases, an individual, thought "social engineering", can obtain a user ID and password simply by calling the company's technology center on the telephone. 

Another is the professional industrial spy, who, for example, typically enters though a rear door wearing a service or repair uniform. This individual knows from experience that many companies have a rear door that employees often use for cigarette breaks. This door frequently is blocked open so that the employees can easily reenter. It can be identified by the cigarette butts around it on the ground.


2) Eavesdroppers 


The phrase "Eavesdroppers" basically means that people who eavesdrop, or people who listen in on conversations, will only hear people saying bad things about them behind their back or without them knowing. Standard cathode-ray tubes used in common video display units emit electromagnetic interference on a frequency capable of being picked up by an ordinary television set. 

Anyone with this equipment can monitor sensitive information as it appears on the company's CRTs. Any information that passes though any public communication network is vulnerable to eavesdropping and piggybacking. For example, simply removing one wire from a Tandy ( Radio Shack) scanner will allow one to monitor analog cellular telephone communications. There are clubs of individuals who make a regular habit  of recording telephone conversations involving celebrities and public figures.

How To Install Cell Phone Spy Tracking Application



How To Hack Your Neighbors Internet



That All, Thank You :)






No comments:

Post a Comment