Home
Browse
Create
Search
Log in
Sign up
Upgrade to remove ads
Only $2.99/month
Insider Threat
STUDY
Flashcards
Learn
Write
Spell
Test
PLAY
Match
Gravity
Terms in this set (11)
A Threat We Can't Ignore
Documented incidents are prevalent
- Carnegie Melon's SEI has studied over 700 cybercrimes originating from insider threat since 2000
Many more occurring
- In 2007, the Secret Service et al. conducted a survey of law enforcement officials & security execs
- 31% of electronic crimes involved an insider
- 49% of respondents experienced insider threat in the past year
Wikileaks, anyone?
What is insider threat?
When a malicious actor intentionally exceeds or misuses an authorized level of access
Note: not elevation of privilege, but an abuse of already-given privilege
Actors
- Current employees
- Former employees (esp. "recently former")
- Contractors
Affected the security of the organization
- Data
- Intellectual property
- Daily business operations
Double Threat to SE
Insider threat affects SE in two ways
- Insider users for the system that we release
- e.g. hospital administrators
- Insiders developers to our own software development company
- e.g. disgruntled developers
Liability considerations
- Will our software facilitate insider threat?
- Bring this up in your requirements elicitation meeting
- e.g. Audit mechanisms
- e.g. Deployment mechanisms
- For everything else: hire some lawyers for a sneaky EULA
Types of Insiders
Pure insider
- e.g. system administrator, developer
Insider associate
- e.g. developer, but on a different project
Outside affiliate
- e.g. outsourced contractor
Classes of Threats
IT sabotage
Personal financial gain
Business advantage
- e.g. industrial espionage
Miscellaneous
Some Considerations
Majority of the attacks required significant planning ahead of time
Majority of insider attacks took place physically on the premise
Majority of insider attacks faced criminal charges. And in most cases, the insiders were aware that they would face charges
Prevention vs. Detection
Prevention is extraordinarily hard
- Work environment
- Predicting human nature
- Deterrents are only somewhat effective
Detection is much more feasible
- Usually by someone using common sense
- Audits of access logs
- In most cases, live network detection was not involved
- Drawback: reactive
Mobile Changed Everything
Today, we carry computers with us everywhere we go
- Easier to take assets with us
- Easier to access assets remotely
- Easier to provide access to others
"Bring Your Own Device" is becoming the norm
Modern reactions:
- Monitor everything (privacy concerns)
- Disallow mobile devices entirely (employees don't like that)
- Separate networks (tough to manage)
Developer Insiders
"Security through obscurity alone" is really not an option
- Insider would know what servers to go to
- Insider knows the attack surface
Access to production servers should be limited
- Non-release changes to production need to be documented
- Forces you to document your deployment process anyway
On introducing backdoors
- Very rarely introduced in the development phase
- Most often in the maintenance phase
General Suggestions
Be aware of the threat
- Keep up with the latest stories
- Apply those situations to yours
"Buddy" system
- Nobody should be left physically alone with important resources
Logging and auditing
- Everything is logged
- Audits should actually happen periodically both as deterrent and for repudiation
Job termination policies
- Have one.
- Be prepared to disable accounts quickly
Archives & offsite backups
- Mitigate tampering and destruction of backups
Rotate duties
- Better detection of anomalies
- Better knowledge transfer anyway
Holistic approach
- People, data, technology, procedures, policies
Some Resources
SEI's CERT Insider Threat group
- Definitive resource
- http://www.cert.org/insider_threat/
- http://www.cert.org/archive/pdf/ecrimesummary07.pdf
The Insider Threat: Combating the Enemy Within, by Clive Blackwell
- ISBN 9781849280112
- Available via RIT library electronically for free
THIS SET IS OFTEN IN FOLDERS WITH...
DHS Travel Card (GTCC) Training
15 terms
USCG Workforce Resilience
14 terms
USCG INFOSEC Fundamentals
11 terms
Quiz 4 Information Security Fundamentals
31 terms
YOU MIGHT ALSO LIKE...
CYB 333 Q1
58 terms
PCI QSR Requirements
80 terms
Chap 9 Security
48 terms
BIS Exam 3 (8)
38 terms
OTHER SETS BY THIS CREATOR
11a) Rigorous Evaluation
12 terms
Common Vulnerability Scoring System
15 terms
Deployment and Distribution
7 terms
Usability
12 terms
OTHER QUIZLET SETS
Chapter 6 - Salon Buisness
30 terms
Battle of the Books 2013/2014
520 terms
Polysci Final
71 terms
MKTG
113 terms