Why are internal threats oftentimes more successful than external threats?
Answer / chaitanya
When you see something day in and day out, even if it shocks you at first, you tend to get used to it. This means that if you see somebody that pokes around day after day, month after month, you might get used to the fact that he’s just curious. You let your guard down, and don’t react as quickly to possible threats. On the other hand, say for example you have an annoyed employee that is soon to be fired and wants to show his soon to be former employer that he can bring them down, so he sells his still active credentials and card-key to a local group that specializes in white-collar crime. Still other infiltrators dress up as delivery people and wander around aimlessly in office buildings, getting information off of post-it notes and papers lying around. External threats do not have access to near this level of information about the company, and more often than not do not get in as far as somebody that spent 20 bucks on a knock-off UPS uniform.
| Is This Answer Correct ? | 1 Yes | 3 No |
1. Assume that passwords are selected from four-character combination of 26 alphabetic characters. Assume that an adversary is able to attempt passwords at a rate of one per second. a. Assuming no feedback to the adversary until each attempt has been completed, what is the expected time to recover the correct password? b. Assuming feedback to the adversary flagging an error as each incorrect character is entered, what is the expected time to discover the correct password?
What’s better, a red team or a blue team?
Why would you bring in an outside contractor to perform a penetration test?
What is the Three-way handshake? How can it be used to create a DOS attack?
What is your opinion on hacktivist groups such as Anonymous?
What is data protection in transit vs data protection at rest?
What is the Chain of Custody?
What’s the difference between a White Box test and a Black Box test?
What are the most common computer applications?
How would you find out what a POST code means?
What is the CIA triangle?
What is a spooler on a computer?