Management of Information Security (MindTap Course List)
Management of Information Security (MindTap Course List)
5th Edition
ISBN: 9781305501256
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Cengage Learning
Expert Solution & Answer
Book Icon
Chapter 3, Problem 1E

Explanation of Solution

 Justification:

  • According to the article named Internal vs. External Penetrations: a Computer Security Dilemma, there are three different types of users related to computer resources namely, masquerader, legitimate and clandestine.
    • Masquerader: The user steals the information to access the computer resources.
    • Legitimate: The user uses his/her individual credentials to access the computer resources.
    • Clandestine: The user includes super user privileges.
  • These users can act as threats to the computer resources.
  • The outsider is the user who doesn’t have the access to use the data related to computer resources whereas insider is the employee of the organization that has the access to use the data related to computer resources.
  • The following table represents the change in the CSI/FBI reports...

Blurred answer
Students have asked these similar questions
In the case that illegal action is carried out online, what kinds of assumptions are often formed about the perpetrator?
elucidate on the types of intruders.
What are the five risk-control methods you employ?
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Information Technology Project Management
Computer Science
ISBN:9781337101356
Author:Kathy Schwalbe
Publisher:Cengage Learning