
Threats from Within a Zone of Trust
41
Internet connectivity from the MPLS provider may still be the source of security incidents
through other paths, such as through other Internet service providers (ISPs). But this is
outside the scope of this book.
Threats from Within a Zone of Trust
The 2004 CSI/FBI Computer Crime and Security Survey shows that about the same number
of security incidents have their origin on the inside as on the outside of an enterprise. More
generically speaking, this refers to a zone of trust. Without any doubt, in many networks,
insiders represent at least the same threat to a network as an outsider.
This principle ...