Where Do Cyber Attacks Come From?
People with access to data, computers & networks1. Insiders: Employees and Vendors – Very Large – Malicious – Inadvertent 2. Insider/Outsider Combination – Large 3. Random Outsider: Exposing known weaknesses – Medium 4. Purposeful Outsider: Known target - Small |