Sagot :
Answer:
An individual who seizes supervisory control of the system and uses this control to evade auditing and access controls or to suppress audit collection. Intruder attacks range from the benign to the serious. ... perform unauthorized modifications to data, or disrupt the system.
Explanation: