1) The document discusses different types of intruders including masqueraders, misfeasors, and clandestine users. Masqueraders are outsiders who penetrate access controls, misfeasors are legitimate users who access unauthorized data, and clandestine users seize control to evade detection.
2) Intruder attacks range from benign curiosity to serious attempts to access privileged data or disrupt systems. Common intrusion examples include password cracking, unauthorized data access, and packet sniffing.
3) Intrusion detection is important as a secondary line of defense when prevention fails. It can help identify intruders, collect information on techniques, and act as a deterrent. Behavior-based detection looks for