Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security Breaches Hackers vs Insiders  2005 survey done by the U.S. Secret Service in conjunction with CERT  The survey shows that of the insiders who.

Similar presentations


Presentation on theme: "Security Breaches Hackers vs Insiders  2005 survey done by the U.S. Secret Service in conjunction with CERT  The survey shows that of the insiders who."— Presentation transcript:

1

2 Security Breaches Hackers vs Insiders  2005 survey done by the U.S. Secret Service in conjunction with CERT  The survey shows that of the insiders who cause security breaches, 59 percent were former employees or former contractors. Of those, 48 percent had been fired, 38 percent had resigned and 7 percent had been laid off.  Witiger.com> rticle.php/

3 Slide 3 of 19 Student project in FSM 620; Eric H., Zac H., Rameez H. April Agenda Identify the Risk Definitions Who is effected? What can happen? Influencing Environment The environments How the environments effect the risks? Measuring Risks What are the measures to deal with the risks? Opinions How to handle risks and consequences to.. Customers and 3 rd party affiliates

4 Slide 4 of 19 Student project in FSM 620; Eric H., Zac H., Rameez H. April What is Internal Threat? in·ter·nal [in-tur-nl] Pronunciation Key –adjective 1. situated or existing in the interior of something; interior

5 Slide 5 of 19 Student project in FSM 620; Eric H., Zac H., Rameez H. April threat (thrět) n. 1. An expression of an intention to inflict pain, injury, evil, or punishment. 2. An indication of impending danger or harm. 3. One that is regarded as a possible danger; a menace.

6 Slide 6 of 19 Student project in FSM 620; Eric H., Zac H., Rameez H. April Internal + Threat  In terms of business Internal threats expose the business making it vunerable  CAUSE:  Active employee  Ex-employee  Third party

7 Slide 7 of 19 Student project in FSM 620; Eric H., Zac H., Rameez H. April Internal Threats  Not easy to find information and examples makes vulnerabilities public knowledge  Weakens investor confidence  If deposit taking institution may cause “run on the bank”  Makes the company look bad in the public eye  Negative PR = NOT GOOD

8 Slide 8 of 19 Student project in FSM 620; Eric H., Zac H., Rameez H. April Who is effected?  Customers  The business  Third Party

9 Slide 9 of 19 Student project in FSM 620; Eric H., Zac H., Rameez H. April What can Happen?  Lost profits  Lost market share  Lost investor confidence  Negative PR

10 Slide 10 of 19 Student project in FSM 620; Eric H., Zac H., Rameez H. April Influencing Environments o Economic Environment o Competitive Environment o Political Environment o Social/Cultural Environment o Technological Environment

11 Slide 11 of 19 Student project in FSM 620; Eric H., Zac H., Rameez H. April Economical and Competitive  3 rd party  Outsourcing – cut costs  Cut corners  Former Employee  Former Employees – economic  some employees are enticed, (sometimes by their new employers) to use their old company passwords and inside information to acquire confidential information) to use their old company

12 Slide 12 of 19 Student project in FSM 620; Eric H., Zac H., Rameez H. April Social and Cultural  Former Employees  Who has some grudge against company (for being laid off or fired maybe) and have malicious intentions in creating a situation adverse to business operations)

13 Slide 13 of 19 Student project in FSM 620; Eric H., Zac H., Rameez H. April Political  Legislature related to client information retention  CSB investors victimized  Sponsorship Scandel

14 Slide 14 of 19 Student project in FSM 620; Eric H., Zac H., Rameez H. April Technological  Hard to keep up with in order to prevent threats  “Vishing”

15 Slide 15 of 19 Student project in FSM 620; Eric H., Zac H., Rameez H. April What are the measures to deal with the risks?  Train and educate employees  Having a security system  Contracts

16 Slide 16 of 19 Student project in FSM 620; Eric H., Zac H., Rameez H. April Future Circumstances  Coke will be reviewing its security measures currently in place  Competition is becoming fierce, not all companies can be expected to act like Pepsi and do the right thing

17 Slide 17 of 19 Student project in FSM 620; Eric H., Zac H., Rameez H. April Ability to Handle Internal Threats  Spread the info amongst a few employees  Employees are assigned a level based on their position in the company.  All sensitive info is also assigned a level  Only high level employee’s can see highly confidential information.  Intranet  Removing access (passwords) a day before termination

18 Slide 18 of 19 Student project in FSM 620; Eric H., Zac H., Rameez H. April Handling Third Parties  Companies have a disclaimer when using a third party.  To inform the customer that the offer or service is from another company

19 Slide 19 of 19 Student project in FSM 620; Eric H., Zac H., Rameez H. April What have we learned?


Download ppt "Security Breaches Hackers vs Insiders  2005 survey done by the U.S. Secret Service in conjunction with CERT  The survey shows that of the insiders who."

Similar presentations


Ads by Google