(2) Damage to legal rights by illegal use. It mainly
means some information is used by some person without
authorization or in the way of non-authorization. Firstly,
interception: it means to hiddenly obtain information
resources and sensitive information in systems with all
variety of possible legal or illegal means. For example,
wiretap signals in transmission, or intercept useful
information by taking advantage of electromagnetic leakage
generating during the work of communication equipment,
etc.; through long-term interception over systems, conduct
study on parameters about changes of communication
frequency, information flow direction, communication
capacity, etc. with the statistical analysis method and find
out valuable information and laws therefrom. Secondly,
impersonation: it means illegal users pretend to be legal ones
or users with low privilege pretend to be the ones with high
privilege by cheating communication systems (or users).
Most hackers conduct attacks in a pretending way. Attackers
obtain rights without authorization or privileges by taking
advantage of security defects or vulnerabilities of security in
systems. For example, attackers could find out with various
means of attack some “features” of systems which should be
originally kept secret but are exposed; using these “features”,
attackers could bypass the defender and invade into the
interior system to cause damages.