Unauthorized hardware may include computers connected to network segments or hubs and peripheral communication or input/output equipment such as modems, terminals, printers
Intruders actively attempt to circumvent network perimeter defenses. If they can gain physical access to your organization's internal network, they can install their own equipment and software. Alternatively, intruders may learn of insecure (unauthorized) equipment added by users that they can use to gain access to your organization's network.
For example, users might install modems for the purpose of remote access to their office computers from home. Intruders often use automated tools to identify modems attached to public telephone lines.
This usually means unauthorised copying, either by individuals for use by themselves or their friends or by companies who then sell the illegal copies to users.
Many kinds of software protection have been invented to try to reduce software theft
Software theft in 1994 was estimated to have cost $15 billion in worldwide lost revenues to software publishers.