Skip to main content
BluINFO

Where Do Cyber Attacks Come From?

People with access to data, computers & networks

1. Insiders: Employees and Vendors – Very Large

– Malicious

– Inadvertent

2. Insider/Outsider Combination – Large

3. Random Outsider: Exposing known weaknesses – Medium

4. Purposeful Outsider: Known target - Small

laptop_snoop.jpg

 

  • Was this article helpful?