Inside Attacks


Recently, more media attention has been placed on the “sexy cyberattacks” previously cited, rather than insider attacks. But, in reality, more of the widespread attacks are now coming from insiders. CSI confirmed this when it reported that the majority of the attacks in the past year have been from insider abuse and unauthorized access.

And, insiders are not just trustworthy employees. Business partners, subsidiaries, and third-party suppliers have the same access as traditional employees of a company.




Electronic Commerce (Networking Serie 2003)
Electronic Commerce (Charles River Media Networking/Security)
ISBN: 1584500646
EAN: 2147483647
Year: 2004
Pages: 260
Authors: Pete Loshin

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net