By: Taysha Johnson. What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access.

Slides:



Advertisements
Similar presentations
Northside I.S.D. Acceptable Use Policy
Advertisements

Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
There are different threats and impacts that affect an organisation. Threats are things that the organisation will get attacked by so for example viruses.
© 2008 Carnegie Mellon University Preventing Insider Threats: Avoiding the Nightmare Scenario of a Good Employee Gone Bad Dawn Cappelli October 31, 2008.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
THE INSIDER THREAT AND DATA LOSS PREVENTION CSCE 727.
Overview of Joe B. Taylor CS 591 Fall Introduction  Thriving defense manufacturing firm  System administrator angered  His role diminished with.
DHS SECURITY INCIDENT REPORTING AND RESPONSE SECURITY INCIDENT REPORTING AND RESPONSE DHS managers, employees, and other authorized information users.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
General Purpose Packages
INTELLECTUAL PROPERTY TRADE SECRETS COPYRIGHTS PATENTS.
Joseph Kummer Terri Berry Brad White.  1. Specific instances of employee hacking and the consequences which resulted therefrom.  2. How employees utilize.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Unethical use of Computers and Networks
 What is conflict of interest and how can it be avoided  What factors should be considered when determining a “ fair wage “
Information Warfare Playgrounds to Battlegrounds.
Monitoring Employees on Networks: Unethical or Good Business?
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
Topic 5: Basic Security.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Information Warfare Playgrounds to Battlegrounds.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
CONTROLLING INFORMATION SYSTEMS
Computer Security By Duncan Hall.
Security and Ethics Safeguards and Codes of Conduct.
Copyright © 2013 – Curt Hill Computer Security An Overview.
Cybersecurity Test Review Introduction to Digital Technology.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Insider Threat Awareness
INSIDER THREATS BY: DENZEL GAY COSC 356. ROAD MAP What makes the insider threat important Types of Threats Logic bombs Ways to prevent.
Overview of Joe B. Taylor CS 591 Fall Introduction  Thriving defense manufacturing firm  System administrator angered  His role diminished with.
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Add video notes to lecture
Ethics in finance Dr. Chao Yuang Shiang Dep. of Finance.
Ogletree, Deakins, Nash, Smoak & Stewart PC
Issues and Protections
CHAPTER FOUR OVERVIEW SECTION ETHICS
Handling Personal Data
Unit 32 – Networked Systems Security
Lecture 14: Business Information Systems - ICT Security
Chapter 11 crime and security in the networked economy
INSIDER THREAT AWARENESS
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Forensics Week 11.
Five Unethical Uses of Computers
Unit 7 – Organisational Systems Security
Update on the Computer Fraud and Abuse Act
INFORMATION SYSTEMS SECURITY and CONTROL
– Communication Technology in a Changing World
Social Issues in Computing
Social Issues in Computing
Ethical Use of Computers
CHAPTER FOUR OVERVIEW SECTION ETHICS
LO1 - Know about aspects of cyber security
Chapter # 3 COMPUTER AND INTERNET CRIME
Indicator 3.02 Use communication skills to foster open, honest communications.
Mohammad Alauthman Computer Security Mohammad Alauthman
Communicating in the IT Industry
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Accounting Information Systems & Computer Fraud
Presentation transcript:

By: Taysha Johnson

What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access to an organization's network, system or data 2.Intentionally exceeding or misusing that access in a manner that negatively affected the confidentiality integrity or availability of the organizations information or information systems

Why is this a problem? Most difficult to deal with because insiders have information and capabilities that “external attackers” may not be able to obtain. Most serious security problem within organizations

The dangers of employees Employee Sabatoge : Destroying hardware, software, or data. Plant time bomb or logic bomb on computer Employee Hacking: Intentionally accessing a computer resource without authorization or in excess of authorization

Types of attatcks Computer and internet abuse Extortion Financial theft Property theft Data loss Trade Secrets

Computer and internet insider threats Unauthorized access to confidential or non personal information Activities that violate a company's policies about their IT use Downloading pornography Downloading pirated music, video or software Surfing the internet for personal purposes on companys time

Employee extortion Employee using ability to damage systems or access confidential information to extort the company

What is employee extortion? The perpetrator tries to acquire money or other goods by threatening to take actions that would be against the victims interest Example : Employee steal information from a company’s computer and request money to not leak it out to other competitors.

Financial theft 2 different types 1. Finacnial theft Involves misuse of assets or theft of money 2. Intellectual property theft Information owned by company Protected by law Trade secrets, Copyrights, Patents, Trade Names and Trademarks

Data loss Getting rid of computers with hard drives not removed Loss of wireless technology Loss of optical disks Loss of USB RAM drives

Trade secret Pieces of delicate information that a company acts to keep secret For example: blueprints, strategies, product formulations business processes, price lists, customer lists, and any other type of information that the company wants to keep top secret from competitors

PREVENTING ATTACKS…

Why your own employees can be threatening All employees are potential threats because of their knowledge. Employees know the systems in and out meaning they can access any information. They have the authorizations to get into the sensitive areas of a system Employees are not suspicious because most companies tend to trust their employees so they are able to avoid detection

Why might you want to learn how to prevent insider threats? TO AVOID…… Loss or compromise of classified information (Secret Service) Weapons system cloned, destroyed or countered ( US military) Loss of technological advantage (NASSA) Financial loss (Large Franchise Bank) LOSS OF LIFE

Preventing employee insider threat Introduce strict rules on authorization for passwords and codes to log into secure or private systems Focus on three main areas: Hiring Supervising Firing Practice in these areas will lessen the severity of insider threats! If they are all done to perfection.

How to prevent insider threats as an employee Reporting suspicious behavior that may have been related to a classified topic Be aware of the actions around you

How to prevent insider threats as management Inform employees that they are the first line of defense against insider threats. Delegate specific job responsibilities and data access rights Present firm policies to manage accounts and passwords Monitor and collect employee activity logs in real time

Suspicious Behaviors Keeping classified materials in an unauthorized location Discussing classified materials on a non secure phone

Suspicious behavior cont. Repeated or un-required work outside of normal duty hours Sudden change of financial situation or sudden repayment of large debts or loans Trying to conceal travel outside of country

U.S. CASES qbw

Cases involving insiders…. Michael Mitchell Was fired from his job due to poor performance, however he concealed numerous computer files with his employers trade secrets than entered into a consulting agreement with a Korean firm and gave them the stolen trade secrets. He was sentenced to 18 months in prison and was ordered to pay his former employer over $187,000

Cases involving insiders… Chi Mak Sent to the US in 1978 by China to obtain employment in the defense industry with the goal of stealing US defense secrets which he did for over 20 ye ars. Mak was convicted of conspiracy, falling to register as an agent of a foreign government and many others. He was sentenced to 24 years in prison.

Works cited

THE END !!!! =)