Slide 112
Slide 112 text
2 – Identify Threat Agents and Possible Attacks
‣ Insiders: staff, contractors, vendors, etc.
‣ Outsiders: competitors, criminals, activists, etc.
‣ Performing malicious attacks or inadvertent mistakes.
‣ Other agents: fires, earthquakes, malware, etc.