INTRUDER MOTIVATIONS
Several motivations might prompt someone to intrude on another’s
network. Although no text can list all the reasons why someone would decide to
steal or corrupt data, some common themes become evident when looking at the
motivations of previous intruders. To refine the discussion of intruder motivations,
it is first necessary to define some terms. An intruder refers to someone who
attempts to gain access to a network or computer system without authorization.
Intruders can be further classified as follows.
Phreaker
|
Phreakers are individuals who have extensive knowledge of
telephone networks and switching equipment. Their goal is to gain free access
to telephone net work so that they can make local and long distance calls.
|
Cracker
|
Crackers use an advanced knowledge of networking and the
internet to compromise network security without proper authorization,
crackers are usually thought of as having a malicious intent.
|
Hacker
|
Hackers investigate the integrity or security of a network or operating
system, usually relying on advanced programming techniques. Ethical hacker
(white hats) is a term that refers to security consultants or those with good
intentions; companies often hire ethical hackers to test currents defenses (and
thus perhaps expose weaknesses). Hackers with mixed priorities between good
and bad objectives are called grey hats, and hackers with malicious intent
are referred to as black hats.
|
Script kiddies
|
Script kiddies are novice hacker who relies heavily on
publicly available scripts to test the security of a network and scan for
vulnerabilities and weaknesses.
The dividing line between phreakers, crackers, hackers
and script kiddies is that phreakers, crackers, and hackers tend to be more
skilled and normally develop their own tool sets; script kiddies, on the
other hand, tend to be less skilled and use publicly available scripts. The
motivation for someone to attempt to access, alter, or disrupt a network
differs for each intruder.
|
No comments:
Post a Comment