February 2016
Beginner
274 pages
6h 6m
English
Based on the source of the threat, attacks can be broadly classified into the following types:
Threats or attacks that originate from within the network or organization are classified as internal threats. These can be intentional or unintentional.
Typically, such threats involve an insider with a mala fide intention, insider knowledge and/or access. This insider is looking to steal, misuse, modify, corrupt, or destroy enterprise resources. Quite naturally, the insider has no intention of getting caught and hence, makes every attempt to cover their tracks. However, as we will see later in this chapter, every interaction with the crime scene leaves a trace as per Locard's ...
Read now
Unlock full access