Insiders are especially pernicious attackers because they’re trusted. They have access because they’re supposed to have access. They have opportunity, and an understanding of the system, because they use it—or they designed, built, or installed it. They’re already inside the security system, making them much harder to defend against. It’s not possible to design a system without trusted people. They’re everywhere.
Author: Khürt Williams
Hello, I'm Khürt, a Gen X-er residing near Princeton University in Montgomery Township, New Jersey, with a passion for aquariums, terrariums, and photography, capturing moments with digital and 35mm film cameras. I find solace in the woods through hiking, and my eclectic musical tastes span soca, Afrobeat, calypso, 1990s rap, grunge rock, and alternative genres. My tech interests are towards open-source software, Linux, UNIX, and Apple products, particularly macOS.
View all posts by Khürt Williams