Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Why are internal threats oftentimes more successful than external threats?



Why are internal threats oftentimes more successful than external threats?..

Answer / chaitanya

When you see something day in and day out, even if it shocks you at first, you tend to get used to it. This means that if you see somebody that pokes around day after day, month after month, you might get used to the fact that he’s just curious. You let your guard down, and don’t react as quickly to possible threats. On the other hand, say for example you have an annoyed employee that is soon to be fired and wants to show his soon to be former employer that he can bring them down, so he sells his still active credentials and card-key to a local group that specializes in white-collar crime. Still other infiltrators dress up as delivery people and wander around aimlessly in office buildings, getting information off of post-it notes and papers lying around. External threats do not have access to near this level of information about the company, and more often than not do not get in as far as somebody that spent 20 bucks on a knock-off UPS uniform.

Is This Answer Correct ?    1 Yes 3 No

Post New Answer

More Computer Security Interview Questions

What are the most common computer applications?

0 Answers  


On a Windows network, why is it easier to break into a local account than an AD account?

1 Answers  


 What is the difference between a vulnerability and an exploit?

1 Answers  


How would you login to Active Directory from a Linux or Mac box?

0 Answers  


Is a console a computer?

0 Answers  


 What is the difference between Information Protection and Information Assurance?

1 Answers  


 You see a user logging in as root to perform basic functions. Is this a problem?

1 Answers  


 How would you find out what a POST code means?

1 Answers  


 What is Exfiltration?

0 Answers  


What is worse in Firewall Detection, a false negative or a false positive? And why?

1 Answers  


 What’s the difference between a White Box test and a Black Box test?

2 Answers  


 What are salted hashes?

1 Answers  


Categories
  • Computer Security Interview Questions Computer Security (58)
  • Mobile Security Interview Questions Mobile Security (9)
  • Hacking Interview Questions Hacking (33)
  • Security AllOther Interview Questions Security AllOther (4)