answersLogoWhite

0

What is a malicious user?

Updated: 10/3/2023
User Avatar

Wiki User

10y ago

Best Answer

There are 3 levels of malicious users

You will soon notice the ever-present malicious user. The term malicious is used liberally. What we are referring to is an individual or group who has the knowledge, skills, or access to compromise a system's security. Malicious user is a generic category encompassing a variety of roles that deserve additional discussion. A malicious user can be any of the following.

Organized crime (financial motivation)

These malicious users are capable, motivated, well organized, and well funded. They are intent on operations such as cloning cell phones or other wireless devices and stealing money, goods, and services. Organized crime is the most capable category of attackers. Their ability stems from having the resources available to obtain the necessary hardware, software, and knowledge to mount sophisticated attacks quickly if the potential financial benefits justify the effort.

Hackers (nonfinancial motivation)

These malicious users are also capable, motivated, and well organized and may be well funded. Although hacker interest in wireless systems may initially be sparked by the financial or proprietary information the system protects, their attacks are generally focused on achieving notoriety. Attacks that can be expected of hackers include small-scale and wide-scale disruption of operations and the collection and release of sensitive information.

Malicious programmers (financial or brand damage)

These malicious users vary in their technical ability and are usually highly motivated by personal greed, grievance, or grudge. They are usually not well organized but may possess significant knowledge of the wireless system and access to internal processes. Malicious programmers can originate from various sources: a disgruntled employee at a wireless manufacturer; an application programming contractor; operations and support personnel; a knowledgeable programmer who feels wronged by someone associated with the manufacture, distribution, or management of a wireless system or device; a programmer who feels wronged by an individual or a company using wireless systems or devices.

Also in this group we consider attackers with nonmalicious intent whose actions can incur security issues, either inadvertently or because of an interest in improving the system's security. The information and vulnerabilities generated by nonmalicious attackers are capitalized on by malicious attackers if not immediately addressed by the affected wireless component or system.

User Avatar

Wiki User

13y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

10y ago

A malicious user is someone who is purposely trying to cause damage to a computer system.

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is a malicious user?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

The following life experiences might turn a trusted user into a malicious insider exceptThe following life experiences might turn a trusted user into a malicious insider except?

Promotion


Who invented antivirus pro?

anti-virus pro is spyware and hence created by a malicious user


Which malicious program propagates itself across the network without user intervention?

WORM


What life experiences might turn a trusted user into a malicious insider?

Life experiences such as financial struggles, personal grievances, feeling undervalued or unappreciated, or exposure to criminal influences could potentially turn a trusted user into a malicious insider. These experiences may cause someone to rationalize unethical behavior or seek retribution through unauthorized actions within their organization.


A user opens an email attachment that triggers malicious code to delete system files?

Trojan Horse


Life experience might turn trusted user to malicious insider?

Frustration with co-workersStressPromotionFinancial problems


What is a password that has sufficient length and complexity that it is difficult for a hacker or other malicious user to hack?

Strong password


What is a password that has sufficient length and complexity to make it difficult for a hacker or other malicious user to hack?

Strong password


Which part of DNS is most vulnerable to an attack from a malicious user and why?

A Primary Master Server that provides recursive answers is the most vulnerable to an attack from a malicious user because if a Primary Master Server provides recursive answers it is more easily subverted by a DoS attack than one that only provides iterative answers.


Which part of DNS is most vulnerable to an attack from a malicious user an why?

A Primary Master Server that provides recursive answers is the most vulnerable to an attack from a malicious user because if a Primary Master Server provides recursive answers it is more easily subverted by a DoS attack than one that only provides iterative answers.


A malicious user uses commonly-known TCP IP defaults to perform an unauthorized-access attack on a connection?

Technology weakness


A malicious program attaches itself to a file and replicates via email to every address in a user's email address book?

Worm