This document discusses network security and focuses on unit 6 which covers intruders, intrusion detection, and password management. It defines different types of intruders such as masqueraders, misfeasors, and clandestine users. It also describes common intrusion techniques like exploiting vulnerabilities, password cracking, and acquiring privileged access. The document outlines typical behavior patterns of hackers, criminal enterprises, and insider threats. Finally, it discusses the importance of intrusion detection as a secondary line of defense when intrusion prevention fails.