Internal and External Threats

Internal and External Threats
Internal and External Threats

In this article we will talk about Internal and External Threats, and in previous article we already discussed about SOCIAL ENGINEERING – CYBERSECURITY.

Internal and External Threats

So we are going to discuss both type of attacks which can occur in a network no matter what kind of network for example it can be, LAN network, MAN network or WAN network.

Internal Security Threats

Attacks can originate from within an organization or from outside of the organization, as shown in the figure. An internal user, such as an employee or contract partner, can accidently or intentionally:

  • Mishandle confidential data
  • Threaten the operations of internal servers or network infrastructure devices
  • Facilitate outside attacks by connecting infected USB media into the corporate computer system
  • Accidentally invite malware onto the network through malicious email or websites

Internal threats have the potential to cause greater damage than external threats because internal users have direct access to the building and its infrastructure devices. Internal attackers typically have knowledge of the corporate network, its resources, and its confidential data. They may also have knowledge of security countermeasures, policies and higher levels of administrative privileges.

External Security Threats

External threats from amateurs or skilled attackers can exploit vulnerabilities in networked devices, or can use social engineering, such as trickery, to gain access. External attacks exploit weaknesses or vulnerabilities to gain access to internal resources.

Traditional Data

Corporate data includes personnel information, intellectual property, and financial data. Personnel information includes application materials, payroll, offer letters, employee agreements, and any information used in making employment decisions. Intellectual property, such as patents, trademarks and new product plans, allows a business to gain economic advantage over its competitors. Consider this intellectual property as a trade secret; losing this information can be disastrous for the future of the company. Financial data, such as income statements, balance sheets, and cash flow statements, gives insight into the health of the company.

1 Trackback / Pingback

  1. Introduction to Linux - Cisco Education

Leave a Reply

Your email address will not be published.