You are currently viewing CISSP certification: Insider vs. outsider compromises.

CISSP certification: Insider vs. outsider compromises.

Types of attackers:

  • Outsiders:
  • Insiders:
    • Authorized individuals – Not necessarily to the compromised system, who intentionally or unintentionally compromise the system or data.
    • This could be: Assault on an employee, blackmail, browsing of proprietary information, computer abuse, fraud and theft, information bribery, input of falsified or corrupted data.
    • 38-52% of Risks are from insiders, another reason good Authentication and Authorization controls are needed.

Thor Pedersen

IT, information security, and project management trainer Best selling CISSP. CISM, and PMP instructor on Udemy. CISSP, CISM, C|EH, CDPSE, PMP, 2x CCNP, CompTIA Security+, SCP, 3x CCNA, et. Al.