The Enemy at the Gates II: The Enemy Within
The effort to secure cyberspace continues unabated. Yet, losses continue to mount. If we are to gain ground in this effort, we must understand our adversaries and the mechanisms they use to inflict losses. When we know the threats facing our information assets and the potential losses the assets face, we can begin to build more effective defenses using well defined risk management methodologies. This paper examines top computer executives’ perspectives on current threats to information security, and compares those threats to a previous study from 2002.
|
© 2026 CISSE™. All rights reserved. This copyright notice applies only to website content on CISSE.info. It does not apply to the Open Journal platform at CISSE.info/journal. All journal articles are © their respective authors and published under the CC BY 4.0 license. |