Date Added: May 2012
Criminals have long employed the tactic of masking their true identity, from disguises to aliases to caller-id blocking. It should come as no surprise then, that criminals who conduct their nefarious activities on networks and computers should employ such techniques. When a user of an information system takes an action that user was not legally allowed to take, it is called intrusion. Internal intruders have legitimate access through user accounts; external intruders break into a system without benefit of a user account A server is a system which keeps running continuously and the administrator cannot monitor the system all the time.