Where Attacks Can Come From

Unfortunately, companies can no longer afford the attitude that computer attacks happen only to someone else, or that attacks come from only outside the organization. The insider threat is an often overlooked but potentially serious problem. A recent Department of Defense study estimated that 87% of information system attacks are perpetrated by individuals inside the victim organization. The following list identifies common types of hackers:

  • Accidental hacker. It is possible to inadvertently break in to a system, either from inside an organization or outside. Accidental hackers usually stop when they realize they have accessed a system without authorization.

  • New hacker. Newcomers to the hacking world often use scripts ...

Get TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.