Download presentation
Presentation is loading. Please wait.
Published byHubert William Hines Modified over 8 years ago
1
Overview of Joe B. Taylor CS 591 Fall 2008
2
Introduction Thriving defense manufacturing firm System administrator angered His role diminished with network he created Intimidates co-worker, obtains only backup tapes Terminated for abusive treatment of co-workers Logic bomb deletes system $10 Million in damage to the company 80 employees laid off
3
What is an Insider Attack? Insider: person with legitimate access Attack: harm or damage Common goals Sabotage Theft of intellectual property Fraud
4
Who are these Insiders? The typical attacker 32 years old Male Former full-time employee System Administrator
5
Why do they Attack? Revenge Termination Disputes with employers Demotions Dissatisfaction with salary or bonuses Greed Most not in financial need Outsiders persuade and pay for modifying data
6
When do they Attack? After a negative work-related event After displaying concerning behavior at work After planning the attack After technical preparation
7
How do we mitigate the risk? Awareness Train employees on the importance of security Train management on the warning signs Prevention Effective implementation of available protection Deterrence Feedback to insiders about insider misuse Publicize presence of capabilities to detect misuse
8
References Management and Education of the Risk of Insider Threat (MERIT): Mitigating the Risk of Sabotage to Employers’ Information, Systems, or Networks Management and Education of the Risk of Insider Threat (MERIT): Mitigating the Risk of Sabotage to Employers’ Information, Systems, or Networks Common Sense Guide to Prevention and Detection of Insider Threats: Version 2.1 Common Sense Guide to Prevention and Detection of Insider Threats: Version 2.1 Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors The "Big Picture" of Insider IT Sabotage Across U.S. Critical Infrastructures The "Big Picture" of Insider IT Sabotage Across U.S. Critical Infrastructures DoD Insider Threat Mitigation DoD Insider Threat Mitigation
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.