Actions of insiders originate at a trusted domain within the
network, and are not subjected to thorough security
controls in the same way as external accesses. For instance
within the organization network there is often no internal
firewall, which allows insiders to stage a broader range of
attacks.