Why are internal threats oftentimes more successful than external threats?



Why are internal threats oftentimes more successful than external threats?..

Answer / chaitanya

When you see something day in and day out, even if it shocks you at first, you tend to get used to it. This means that if you see somebody that pokes around day after day, month after month, you might get used to the fact that he’s just curious. You let your guard down, and don’t react as quickly to possible threats. On the other hand, say for example you have an annoyed employee that is soon to be fired and wants to show his soon to be former employer that he can bring them down, so he sells his still active credentials and card-key to a local group that specializes in white-collar crime. Still other infiltrators dress up as delivery people and wander around aimlessly in office buildings, getting information off of post-it notes and papers lying around. External threats do not have access to near this level of information about the company, and more often than not do not get in as far as somebody that spent 20 bucks on a knock-off UPS uniform.

Is This Answer Correct ?    1 Yes 3 No

Post New Answer

More Computer Security Interview Questions

What is a spooler on a computer?

0 Answers  


 Why is deleted data not truly gone when you delete it?

1 Answers  


You need to reset a password-protected BIOS configuration. What do you do?

1 Answers  


What do you think of social networking sites such as Facebook and LinkedIn?

1 Answers  


What is meant by computer application?

0 Answers  






How would you login to Active Directory from a Linux or Mac box?

0 Answers  


You find out that there is an active problem on your network. You can fix it, but it is out of your jurisdiction. What do you do?

1 Answers  


 Why would you want to use SSH from a Windows pc?

1 Answers  


A phonetic password generator picks two segments randomly for each six-letter password. The form of each segment is CVC (consonant, vowel, consonant), where V= < a, e, i, o, u > and C = (V.) ̅ What is the total password population? What is the probability of an adversary guessing a password correctly?

0 Answers  


 What is the difference between Information Protection and Information Assurance?

1 Answers  


Does indexing slow down computer?

0 Answers  


What is the Three-way handshake? How can it be used to create a DOS attack?

1 Answers  


Categories
  • Computer Security Interview Questions Computer Security (58)
  • Mobile Security Interview Questions Mobile Security (9)
  • Hacking Interview Questions Hacking (33)
  • Security AllOther Interview Questions Security AllOther (4)