Q

What percentage of security breaches originate internally vs. externally?

What percentage of security breaches originate internally vs. externally? Where could I find further information on this topic?

This is a statistic that's quoted a lot -- often 80% of breaches occur internally -- but there's varying data on it. The CSI/FBI Computer Crime and Security Survey has interesting data on this, but I would also recommend checking out other surveys from security magazines and research firms. A Google search using the words "information security survey" turns up some good info.

The bottom line is no one really knows for sure, but it's a considerable amount. Based on what I see, the odds are that more external attacks occur, but are often blocked by basic perimeter security controls. On the other hand, even though internal security breaches probably occur less often, when they do, it's bad news. I wrote an article intellectual property leakage (which is what most internal breaches are about) for the Feb. 2004 issue of Information Security magazine that covers this subject and provides a survey of vendor solutions.


For more info on this topic, please visit these SearchSecurity.com resources:
  • Are insiders really a bigger threat?
  • Security Policies Tip: Terminating a system administrator
  • Employee monitoring: Is Big Brother a bad idea?
  • Read the March 2004 issue of Information Security magazine for more in-depth coverage.
  • This was first published in March 2004
    This Content Component encountered an error

    Pro+

    Features

    Enjoy the benefits of Pro+ membership, learn more and join.

    Have a question for an expert?

    Please add a title for your question

    Get answers from a TechTarget expert on whatever's puzzling you.

    You will be able to add details on the next page.

    0 comments

    Oldest 

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to:

    -ADS BY GOOGLE

    SearchCloudSecurity

    SearchNetworking

    SearchCIO

    SearchConsumerization

    SearchEnterpriseDesktop

    SearchCloudComputing

    ComputerWeekly

    Close