Classes of intruders.

List and briefly define three classes of intruders. What are two common techniques used to protect a password file? What are the three benefits that can be provided by an intrusion detection system? What is the difference between statistical anomaly detection and rule-based intrusion detection? […]