Overview of Joe B. Taylor CS 591 Fall 2008. Introduction  Thriving defense manufacturing firm  System administrator angered  His role diminished with.

Slides:



Advertisements
Similar presentations
USC Health and Safety Training Workplace Violence.
Advertisements

© 2008 Carnegie Mellon University Preventing Insider Threats: Avoiding the Nightmare Scenario of a Good Employee Gone Bad Dawn Cappelli October 31, 2008.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
© Carnegie Mellon University The CERT Insider Threat Center.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
IS Security Control & Management. Overview n Why worry? n Sources, frequency and severity of problems n Risks to computerized vs. manual systems n Purpose.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
INFORMATION WARFARE Written by: Larry Druffel Presented by: Frank Dang TCOM 614 Introduction to Telecommunication University of Redlands.
1 DETERRING INTERNAL INFORMATION SYSTEMS MISUSE EECS711 : Security Management and Audit Spring 2010 Presenter : Amit Dandekar Instructor : Dr. Hossein.
Engineering Secure Software. Lottery Story A Threat We Can’t Ignore  Documented incidents are prevalent Carnegie Melon’s SEI has studied over 700 cybercrimes.
Factors to be taken into account when designing ICT Security Policies
Stephen S. Yau CSE , Fall Security Strategies.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Computer Crime and CyberCrime Why we need Computer Forensics.
Computer Crime and Information Technology Security
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
BUSINESS B1 Information Security.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
WORKPLACE VIOLENCE SEMINAR SEATTLE FEDERAL EXECUTIVE BOARD ASSOCIATES PROGRAM Update 3/9/1999.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Information Warfare Playgrounds to Battlegrounds.
Information Systems Security Operational Control for Information Security.
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
Kellie E. Tomeo, Esq Rampart International, LLC. AdvantageChallenge Increase existing security personnel productivity Increase existing facility personnel.
Chapter 9 Enhancing Information/Computer Security.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
Note1 (Admi1) Overview of administering security.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Scott Charney Cybercrime and Risk Management PwC.
Hurdles in implementation of cyber security in India.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Information Warfare Playgrounds to Battlegrounds.
Weaving Security Blankets Make your own bespoke defensive toolkit Presentation by Max Cizauskas For BSides Toronto 2015.
Introduction to Security Dr. John P. Abraham Professor UTPA.
Safe’n’Sec IT security solutions for enterprises of any size.
IT Security CS5493(74293). IT Security Q: Why do you need security? A: To protect assets.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
Computer Security Threats
Managing Information Security Personnel By Christopher Boehm.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
JANELL LAYSER Training Manual. AWARENESS! Social Engineers are out there, and everyone should be prepared to deal with them! They can contact you by phone,
Cyber Security Foundations Part 1. Cyber Security defined:  Protects computer base information and equipment  Deals with confidentiality of data  Protects.
By: Taysha Johnson. What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access.
INSIDER THREATS BY: DENZEL GAY COSC 356. ROAD MAP What makes the insider threat important Types of Threats Logic bombs Ways to prevent.
Overview of Joe B. Taylor CS 591 Fall Introduction  Thriving defense manufacturing firm  System administrator angered  His role diminished with.
Cyber Insurance Risk Transfer Alternatives
Insiders are Today’s Biggest Security Threat
Team 1 – Incident Response
CHAPTER FOUR OVERVIEW SECTION ETHICS
Information Technology Sector
Compliance with hardening standards
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
SY0-501 Dumps PDF CompTIA Security+ Certification Exam.
Computer Crime and Security Measures
Understanding Cyber Insurance NASCUS/CUNA Cybersecurity Symposium
INFORMATION SYSTEMS SECURITY and CONTROL
CHAPTER FOUR OVERVIEW SECTION ETHICS
INTRODUCTION For years there have been attacks around the United States for sometimes now, which is unexpected. However; there have not been good restoration.
Engineering Secure Software
Mohammad Alauthman Computer Security Mohammad Alauthman
Accounting Information Systems & Computer Fraud
Introduction to Digital Forensics
A Field Guide to Insider Threat Helps Manage the Risk
Presentation transcript:

Overview of Joe B. Taylor CS 591 Fall 2008

Introduction  Thriving defense manufacturing firm  System administrator angered  His role diminished with network he created  Intimidates co-worker, obtains only backup tapes  Terminated for abusive treatment of co-workers  Logic bomb deletes system  $10 Million in damage to the company  80 employees laid off 12/8/08 2 Joe Taylor/Insider Attack

What is an Insider Attack?  Insider: person with legitimate access  Attack: harm or damage  Common goals  Sabotage  Theft of intellectual property  Fraud 12/8/08 3 Joe Taylor/Insider Attack

Who are these Insiders?  The typical attacker  32 years old  Male  Former full-time employee  System Administrator 12/8/08 4 Joe Taylor/Insider Attack

Why do they Attack?  Revenge  Termination  Disputes with employers  Demotions  Dissatisfaction with salary or bonuses  Greed  Most not in financial need  Outsiders persuade and pay for modifying data 12/8/08 5 Joe Taylor/Insider Attack

When do they Attack?  After a negative work-related event  After displaying concerning behavior at work  After planning the attack  After technical preparation 12/8/08 6 Joe Taylor/Insider Attack

How do we mitigate the risk?  Awareness  Train employees on the importance of security  Train management on the warning signs  Prevention  Effective implementation of available protection  Expectation setting and positive intervention  Deterrence  Feedback to insiders about insider misuse  Publicize presence of capabilities to detect misuse 12/8/08 7 Joe Taylor/Insider Attack

References  Management and Education of the Risk of Insider Threat (MERIT): Mitigating the Risk of Sabotage to Employers’ Information, Systems, or Networks Management and Education of the Risk of Insider Threat (MERIT): Mitigating the Risk of Sabotage to Employers’ Information, Systems, or Networks  Common Sense Guide to Prevention and Detection of Insider Threats: Version 2.1 Common Sense Guide to Prevention and Detection of Insider Threats: Version 2.1  Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors  The "Big Picture" of Insider IT Sabotage Across U.S. Critical Infrastructures The "Big Picture" of Insider IT Sabotage Across U.S. Critical Infrastructures  DoD Insider Threat Mitigation DoD Insider Threat Mitigation 12/8/08 8 Joe Taylor/Insider Attack