1 FSTC’s 2008 Annual Conference On the Innovative Edge: Successful Strategies for Financial Services Industry Navigators The Financial Services Technology.

Slides:



Advertisements
Similar presentations
© Peter Readings Data Leakage Pete Readings CISSP.
Advertisements

Introduction and Overview of Digital Crime and Digital Terrorism
OCTAVESM Process 4 Create Threat Profiles
S3-1 © 2001 Carnegie Mellon University OCTAVE SM Process 3 Identify Staff Knowledge Software Engineering Institute Carnegie Mellon University Pittsburgh,
Chapter 11: Computer Crime, Fraud, Ethics, and Privacy
Executive Dilemmas in the Information Age
Privacy (or Data) Breaches - Examples South Carolina Department of Revenue Hackers got into the SCDOR’s computers, and stole information on up to 3.2 Million.
© 2008 Carnegie Mellon University Preventing Insider Threats: Avoiding the Nightmare Scenario of a Good Employee Gone Bad Dawn Cappelli October 31, 2008.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
S2-1 © 2001 Carnegie Mellon University OCTAVE SM Process 2 Identify Operational Area Management Knowledge Software Engineering Institute Carnegie Mellon.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
© Carnegie Mellon University The CERT Insider Threat Center.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Overview of Joe B. Taylor CS 591 Fall Introduction  Thriving defense manufacturing firm  System administrator angered  His role diminished with.
CERT ® System and Network Security Practices Presented by Julia H. Allen at the NCISSE 2001: 5th National Colloquium for Information Systems Security Education,
Security Controls – What Works
CST 481/598 Many thanks to Jeni Li.  Potential negative impact to an asset  Probability of a loss  A function of three variables  The probability.
Chapter 1 Introduction to Security
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
Engineering Secure Software. Lottery Story A Threat We Can’t Ignore  Documented incidents are prevalent Carnegie Melon’s SEI has studied over 700 cybercrimes.
© 2003 by Carnegie Mellon University page 1 Information Security Risk Evaluation for Colleges and Universities Carol Woody Senior Technical Staff Software.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Computer Security: Principles and Practice
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
© 2013 Carnegie Mellon University Best Practices in Insider Threat Mitigation CSIAC Insider Threat Workshop Randall Trzeciak 15 August 2013
90% of EU exports consist of product and services of IPR-intensive industries. Among 269 senior risk managers, 53% said IP loss or theft had inflicted.
Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 14 – Human Factors.
Unethical use of Computers and Networks
Monitoring Employees on Networks: Unethical or Good Business?
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Chapter 9 Enhancing Information/Computer Security.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
Peter Sakaris CISSP Booz Allen Hamilton, 1299 Farnam Street Suite 1230, Omaha, NE Office The Insider Threat.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Prepared by Dept. of Information Technology & Telecommunications, November 19, 2015 Application Security Business Risk and Data Protection Gregory Neuhaus.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Web Page Design and Development I Standards Standard A Safety and Ethics – 3 Identify potential abuse and unethical uses of computers and networks.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Friday, October 23, Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
CONTROLLING INFORMATION SYSTEMS
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 3 OTHER DAMAGING THREATS.
1 The 28 th Annual International Computer Software and Applications Conference COMPSAC 2004 Hong Kong September 28, :30 am – 12:00 noon Session.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
BBI 2O Name:. With a partner discuss each of the following terms and what they mean to you. Then write IN YOUR OWN WORDS the definitions in the following.
Argonne Office of Counterintelligence Intelligence Analysis Division Argonne National Laboratory.
“2016 Will Be Better” (Prediction to the OCU Staff in November 2015)
Background/Reference Checking HR400 Unit 8 Seminar.
By: Taysha Johnson. What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access.
Insider Threat Awareness
INSIDER THREATS BY: DENZEL GAY COSC 356. ROAD MAP What makes the insider threat important Types of Threats Logic bombs Ways to prevent.
Overview of Joe B. Taylor CS 591 Fall Introduction  Thriving defense manufacturing firm  System administrator angered  His role diminished with.
Cybersecurity as a Business Differentiator
E&O Risk Management: Meeting the Challenge of Change
Insiders are Today’s Biggest Security Threat
Cybersecurity Awareness
INFORMATION SYSTEMS SECURITY and CONTROL
Strategic threat assessment
LO1 - Know about aspects of cyber security
Engineering Secure Software
Accounting Information Systems & Computer Fraud
Presentation transcript:

1 FSTC’s 2008 Annual Conference On the Innovative Edge: Successful Strategies for Financial Services Industry Navigators The Financial Services Technology Consortium Empowering the Industry Through Innovative Ideas

FSTC’s 2008 Annual Conference On the Innovative Edge: Successful Strategies for Financial Services Industry Navigators Protecting The Flanks From All Sides: The Insider Threat

© 2008 Carnegie Mellon University Protecting The Flanks From All Sides: The Insider Threat Andrew Moore CERT and CyLab of CMU FSTC 2008 Annual Conference Breakout Session 1 : 9: :30 AM Thursday, June 19, 2008

4 Agenda Background Exploration of types of insider crime: Theft/Modification of information for financial gain Theft of information for business advantage IT sabotage Discussion

5 TRUE STORY: Credit union customers lose all access to their money from Friday night through Monday… Fired system administrator sabotages systems on his way out

6 TRUE STORY: Financial institution discovers $691 million in losses... Covered up for 5 years by trusted employee

7 COULD THIS HAPPEN TO YOU? 7

8 Definition of Malicious Insider From the CERT/US Secret Service Insider Threat Study Current or former employees or contractors who o intentionally exceeded or misused an authorized level of network, system or data access in a manner that o affected the security of the organizations’ data, systems, or daily business operations.

9 How bad is the insider threat?

e-Crime Watch Survey CSO Magazine, USSS, Microsoft & CERT 671 respondents Percentage of Participants Who Experienced an Insider Incident

11 Most Common Insider Incidents Percentage of Participants Who Experienced Specific Type of Insider Incident Unauthorized access Theft of IP Theft of other info Fraud

12 Source of CERT’s Insider Threat Case Data CERT/U.S. Secret Service Insider Threat Study 150 actual insider threat cases Carnegie Mellon CyLab MERIT* Project Approximately 100 insider threat cases Cases not included in CERT/US Secret Service study Cases through 2007 Case data includes both technical and behavioral information MERIT: Management and Education of the Risk of Insider Threat

13 CERT’s Insider Threat Case Breakdown Theft or Modification for Financial Gain Theft for Business Advantage IT Sabotage Misc

14 Scenario 1: Theft or Modification of Information for Financial Gain

15 Theft or Modification for Financial Gain Who did it? Current employees “Low level” positions Gender: fairly equal split Average age: 33 What was stolen/modified? Personally Identifiable Information (PII) Customer Information (CI) Very few cases involved trade secrets How did they steal/modify it? During normal working hours Using authorized access

16 Dynamics of the Crime Most attacks were long, ongoing schemes * At least 1 Insider Colluder At least 1 Outsider Colluder Outsider Induced Acted Alone Theft ⅓⅔½⅓ Modification ½½⅓⅓ * Approximations used for simplicity of presentation

17 A Closer Look at THEFT for Financial Gain

18 Technical Aspects - Theft for Financial Gain Electronically Downloaded to home Looked up and used immediately Copied Phone/fax Malicious code Physically Printouts Handwritten Remaining unknown

19 Organizational Impacts - Theft for Financial Gain < $25K $25K to $100K $100K to $1M > $1M Unknown

20 A Closer Look at MODIFICATION for Financial Gain

21 Technical Aspects – Modification for Financial Gain

22 Organizational Impacts - Modification for Financial Gain < $25K $25K to $100K $100K to $1M > $1M Unk.

23 Scenario 2 Theft of Information for Business Advantage

24 Theft For Business Advantage Who did it? Current employees Technical or sales positions All male Average age: 37 What was stolen? Intellectual Property (IP) Customer Information (CI) How did they steal it? During normal working hours Using authorized access

25 Dynamics of the Crime Most were quick theft upon resignation Stole information to Take to a new job Start a new business Give to a foreign company or government organization Collusion Collusion with at least one insider in almost 1/2 of cases Outsider recruited insider in less than 1/4 of cases Acted alone in 1/2 of cases

26 Technical Aspects – Theft for Business Advantage In order of prevalence: Copied/downloaded information ed information Accessed former employer’s system Compromised account Many other methods

27 Organizational Impacts - Theft for Business Advantage < $25K $100K to $1M * Note: None in range $25K to $100K. > $1M Unknown

28 Scenario 3: IT Sabotage with the Intent to Harm Organization or Individual

29 Insider IT Sabotage Who did it? Former employees Male Highly technical positions Age: 17 – 60 How did they attack? No authorized access Backdoor accounts, shared accounts, other employees’ accounts, insider’s own account Many technically sophisticated Remote access outside normal working hours

30 Dynamics of Insider IT Sabotage Most insiders were disgruntled due to unmet expectations Period of heightened expectations, followed by a precipitating event triggering precursors Behavioral precursors were often observed but ignored by the organization Significant behavioral precursors often came before technical precursors Technical precursors were observable, but not detected by the organization

31 Known Issues Unmet Expectations Insufficient compensation Lack of career advancement Inflexible system policies Coworker relations; supervisor demands Behavioral precursors Drug use; absence/tardiness Aggressive or violent behavior; mood swings Used organization’s computers for personal business Sexual harassment Poor hygiene

32 Insiders created or used unknown access paths to set up their attack and conceal their identity or actions. The majority attacked after termination. Organizations failed to detect technical precursors Lack of physical or electronic access controls facilitated the attack Technical Aspects of Insider IT Sabotage

33 Organizational Impacts of IT Sabotage Inability to conduct business, loss of customer records Inability to produce products Negative media attention Private information forwarded to customers, competitors, or employees Exposure of personal or confidential information Web site defacements Many individuals harmed

34 Summary Insider threat is a problem that impacts and requires understanding by everyone Information Technology Information Security Human Resources Management Physical Security Legal Use enterprise risk management for protection of critical assets from ALL threats, including insiders Incident response plans should include insider incidents Create a culture of security – all employees have responsibility for protection of organization’s information

35 Points of Contact Insider Threat Team Lead: Dawn M. Cappelli Senior Member of the Technical Staff CERT Programs Software Engineering Institute Carnegie Mellon University 4500 Fifth Avenue Pittsburgh, PA – Phone – Business Development: Joseph McLeod Business Manager Software Engineering Institute Carnegie Mellon University 4500 Fifth Avenue Pittsburgh, PA – Phone – FAX – Mobile –

FSTC’s 2008 Annual Conference On the Innovative Edge: Successful Strategies for Financial Services Industry Navigators Coffee Break

FSTC’s 2008 Annual Conference On the Innovative Edge: Successful Strategies for Financial Services Industry Navigators The Financial Services Technology Consortium Empowering the Industry Through Innovative Ideas