This document discusses various topics related to intruders and intrusion detection, including:
1) Different classes of intruders such as masqueraders and misfeasors, and common intrusion techniques like password guessing and capturing.
2) Approaches to intrusion detection such as statistical anomaly detection, rule-based detection, and analyzing audit records.
3) The use of honeypots, password management policies, and proactive password checking to help deter and detect intrusions.