Why are internal threats oftentimes more successful than external threats?
Answer / chaitanya
When you see something day in and day out, even if it shocks you at first, you tend to get used to it. This means that if you see somebody that pokes around day after day, month after month, you might get used to the fact that he’s just curious. You let your guard down, and don’t react as quickly to possible threats. On the other hand, say for example you have an annoyed employee that is soon to be fired and wants to show his soon to be former employer that he can bring them down, so he sells his still active credentials and card-key to a local group that specializes in white-collar crime. Still other infiltrators dress up as delivery people and wander around aimlessly in office buildings, getting information off of post-it notes and papers lying around. External threats do not have access to near this level of information about the company, and more often than not do not get in as far as somebody that spent 20 bucks on a knock-off UPS uniform.
| Is This Answer Correct ? | 1 Yes | 3 No |
What is data protection in transit vs data protection at rest?
What are the most common computer applications?
I’m the CEO of a Fortune 500 company. I make more in an afternoon than you make in a year. I don’t care about this stupid security stuff, it just costs time and money and slows everything down. Why should I care about this junk?
Why would you want to use SSH from a Windows pc?
What is the most commonly used computer application?
You see a user logging in as root to perform basic functions. Is this a problem?
Why is deleted data not truly gone when you delete it?
What is an easy way to configure a network to allow only a single computer to login on a particular jack?
How would you permanently remove the threat of data falling into the wrong hands?
What is the difference between Information Protection and Information Assurance?
On a Windows network, why is it easier to break into a local account than an AD account?
How would you lock down a mobile device?