In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and “steal” all your valuable data. Just as in the real world, there are uninvited guests and people feel happy when they steal or destroy someone else’s property, the computer world could not be deprived of this unfortunate phenomenon. It is truly detestable the perfidy of these attacks. For if it can be onserved immediately the apparent lack of box jewelry, penetration of an accounting server can be detected after a few months when all clients have given up the company services because of the stolen data came to competition and have helped it to make best deals.
Stories about crackers and dangerous viruses delight the computer security books and articles. Maybe this is why the greatest danger in ensuring that security is often overlooked. Because most threats do not come from outside but from within.
The notion of insider is somewhat difficult to define. For example, members of each department is considered as being inside, people from other departments are regarded as outsiders. In terms of security, an insider is someone who is familiar with the procedures and operations of the organization, has friends in the group, while having access to resources and systems offered by this organization.
What makes the inside people even more dangerous is that they are difficult to detect. A stranger is easily noticed when trying to pass one of the barriers between the organization and the outside world, which the member of organization does not need to do.
Computer systems are generally protected from unauthorized access. There are several authentication mechanisms, and then permit of authorized users, but the most common is based on username and password. A user receives a user name and password that he uses when he wants to access a service or a computer.
Pair username / password are for computer systems the role is played by the lock in terms of protecting a room from the entry of strangers. The lock is considered a secure means of protection, but in reality there are persons able to open it, for it is not a problem when they want to access the room. The same is unfortunately true for the world of computers.
A special issue on cybercrime is the perpetrators of these types of crimes. The problem of achieving a “sketch” of those who violate law by computer offenses is very current criminological research worldwide. However the authors profiling may be subject to the influence of existing stereotypes in the media. Unanimity of authors consider that offenses committed through computer systems fall into such “white collar crime”. A “classic” profile of perpetrators of these crimes can be summarized as follows: male aged between 15 and 45, having a good social status, no criminal record, intelligent and motivated. In many cases , the author is an employee of the company even attacked, or know the functioning of the attacked system.