Professional Documents
Culture Documents
1.Insider attack
A perimeter firewall is intended to prevent external network attacks. What happens if the attack
comes from within? Because the attacker is already on your system, the perimeter firewall is
frequently rendered ineffective.
Even if an attack occurs from within your network, firewalls can still be useful IF you have
internal firewalls in addition to perimeter firewalls. Internal firewalls help to segregate certain
network assets, making it more difficult for attackers to go from one system to another. This
gives you more time to respond to the attack while also lengthening the attacker's breakout time.
Careless insider-an unwitting pawn who unintentionally exposes the system to dangers
from outside. This is the most prevalent kind of insider threat and is brought on by errors
like leaving a gadget accessible or falling for a hoax. For instance, a worker who has no
malice in mind could click on an unsafe link and introduce malware into the system.
A mole-a fake who, while theoretically an outsider, has succeeded in obtaining insider
access to a restricted network. This is a person outside of the company who poses as a
stakeholder or staffer.
2.Enforce policies
Organizational policies should be well documented so that you can enforce them and
avoid misunderstandings. To prevent sharing of privileged material that they have
developed, everyone in the company has to be aware of security protocols and understand
their rights in connection to intellectual property (IP).