A majority of attacks come from insiders, people who have direct access to a company’s computer system as part of their job function or a business relationship. Who is considered an insider?
A.
The CEO of the company because he has access to all of the computer systems
B.
A government agency since they know the company computer system strengths and weaknesses
C.
Disgruntled employee, customers, suppliers, vendors, business partners, contractors, temps, and consultants
D.
A competitor to the company because they can directly benefit from the publicity generated by making such an attack
Explanation:
An insider is anyone who already has an foot inside one way or another.