This chapter deals with the concept of protecting the resources/IT infrastructure from internal threats. Internal threats refer to people who are recruited by the organization as employees who are provided access to the internal resources. Mostly organizations focus on securing the network from external threats but fail to address the internal vulnerabilities.
Traditionally, internal users have been able to connect a PC to a switched network and gain immediate access to enterprise resources. As networks grow and resources become available, it is important to limit the access that internal users receive. More technically, a user from the HR department should have a connection to the port that terminates on their respective desk. Access to switches is a convenient entrypoint for internal attackers whose intent is to unlawfully gain access to an enterprise...