Insiders are especially pernicious attackers because they’re trusted. They have access because they’re supposed to have access. They have opportunity, and an understanding of the system, because they use it—or they designed, built, or installed it. They’re already inside the security system, making them much harder to defend against. It’s not possible to design a system without trusted people. They’re everywhere.

Schneier on Security: Insiders

Author:Khürt Williams

A human who works in information security and enjoys photography, Formula 1 and craft ale.