Fandom

The IT Law Wiki

Intrusion

32,196pages on
this wiki
Add New Page
Talk0 Share

Ad blocker interference detected!


Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.

Definitions Edit

General Edit

Intrusion

  • means an unwelcomed entry into an area by force or without permission.
  • "consists of invasive acts that disturb or interrupt one's life or activities."[1]

Information system Edit

An intrusion is "unauthorized access to, and/or activity in, an information system."[2]

Intrusion is

[a]n unauthorized act of bypassing the security mechanisms of a network or information system.[3]

Network security Edit

An intrusion (also referred to as a network intrusion) is an "unauthorized act of bypassing the security mechanisms of a system."[4]

Telecommunications Edit

Intrusion is

[a] communications jamming technique to confuse operators and data processing equipment. It involves the transmission of false messages on victim communication channels.[5]

Overview (Network security) Edit

An intrusion may involve unauthorized access or access in excess of a user's privileges on a network. An intrusion is usually accomplished by taking advantage of a system that is not properly configured, a known vulnerability that was not patched, or weak security imple­mentation such as a blank or easily guessed password.

Although insiders have authorized access, they may engage in unauthorized activities, which are considered intrusions. . . . For example, network management technicians have authorized access to routing tables, and they are authorized to engage in defined activities, such as rerouting traffic around congested nodes. However, they are not authorized to alter routing tables to cause congestion nor are they authorized to delete routing tables, and such acts would be considered intrusions.[6]

Once access to the network has been gained, the intruder(s) can exploit the system in various ways. Some examples include —

References Edit

  1. Privacy Considerations for Internet Protocols, at 14.
  2. Report on the NS/EP Implications of Intrusion Detection Technology Research and Development, at 6.
  3. NICCS, Explore Terms: A Glossary of Common Cybersecurity Terminology (full-text).
  4. CNSSI 4009.
  5. Consolidated List of Glossary Terms.
  6. Protecting Systems Task Force Report on Enhancing the Nation's Network Security Efforts, at 4-5 (emphasis in original).

See also Edit

Also on Fandom

Random Wiki