Assignment
1. List and briefly define four classes of intruders.
2. List and briefly describe the steps typically used by intruders when attacking a system.
3. Provide an example of an activity that may occur in each of the attack steps used by an intruder.
4. Describe the three logical components of an IDS.