Insiders are especially pernicious attackers because they’re trusted. They have access because they’re supposed to have access. They have opportunity, and an understanding of the system, because they use it—or they designed, built, or installed it. They’re already inside the security system, making them much harder to defend against. It’s not possible to design a system without trusted people. They’re everywhere.
Liked this post? Follow this blog to get more.