O'Reilly logo

TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 by Shawn Porter, Debra Littlejohn Shinder, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Where Attacks Can Come From

Unfortunately, companies can no longer afford the attitude that computer attacks happen only to someone else, or that attacks come from only outside the organization. The insider threat is an often overlooked but potentially serious problem. A recent Department of Defense study estimated that 87% of information system attacks are perpetrated by individuals inside the victim organization. The following list identifies common types of hackers:

  • Accidental hacker. It is possible to inadvertently break in to a system, either from inside an organization or outside. Accidental hackers usually stop when they realize they have accessed a system without authorization.

  • New hacker. Newcomers to the hacking world often use scripts ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required