Where Do Cyber Attacks Come From?
| People with access to data, computers & networks 1. Insiders: Employees and Vendors - Very Large - Malicious - Inadvertent 2. Insider/Outsider Combination - Large 3. Random Outsider: Exposing known weaknesses - Medium 4. Purposeful Outsider: Known target - Small | ![]() |
