Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 228 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
228
Dung lượng
2,47 MB
Nội dung
[...]... sometimes The other important question is whether the monitoring is effective Reflections on the Insider Threat 13 3.4 Detecting Insider Attacks Insider attacks are difficult to detect, either by human or technical means One workshop participant observed that most insider attacks are detected only because of some reason to suspect: theinsider may have talked (bragged) about the act, for example In other... resources inside are safe Firewalls are the classic perimeter 14 InsiderAttack and CyberSecurity defense With insider attacks, drawing the protection line is more difficult because the attacker and the sensitive resources are on the same side of the line Intrusion detection systems may be of some value in detecting insider attacks As previously discussed, these systems need to analyze a large amount... retail theft by employees Another participant said that detection of a data leak is unlikely unless there is some trigger that makes the leak prominent 3.5 Technology What technology is available to detect, deter, or prevent insider attacks? Most existing computer security technology is based on the concept of a perimeter defense The attackers are outside the line, the defense blocks the attackers, and the. .. on their business operations Twenty-eight percent of the organizations experienced a negative impact to their reputations TheInsider Threat Study focused on analysis of individual components of insider incidents, such as characteristics of the insider, technical details, planning and communication before the incident, detection and identification of the insider, and consequences of theattack The. .. Escalation 6 Ninety-six percent of the insiders in the Insider Threat Study who committed IT sabotage were male Therefore, male gender is used to describe the generic insider throughout this paper 26 InsiderAttack and CyberSecurity Lax management that permits continually increasing employee expectation can result in major problems later, especially if theinsider is so predisposed The trigger for those... pertaining to the information technology and telecommunications sector, and the other geared to the government sector TheInsider Threat Study provided the first comprehensive analysis of theinsider threat problem CERT’s technical security expertise was augmented with expertise from several experts in the areas of psychology, sociology, insider threat, espionage, cyber crime, and specific domains like the financial... to further utilize the wealth of empirical data from theInsider Threat Study to next concentrate on conveying the "big picture" of the insider threat problem -the complex interactions, relative degree of risk, and unintended consequences of policies, practices, technology, insider psychological issues, and organizational culture over time Thus, the 2 The Insider Threat Study was funded by the USSS,... to say that the same is true for all attacks, by insiders or outsiders Examination of theattack taxonomy shows that this assertion is false By definition, insiders have more access; this is the essence of their status, their responsibilities – and their ability to launch attacks Another way to look at it is to consider system defenses schematically Assume, as is generally the case, that the resource... Introduction Hackers, especially "terrorist hackers" or "cyberwar hackers" get lots of press They do indeed pose a serious problem However, the threat they pose pales before that posed by those closest to us: the insiders The cyberthreat posed by insiders isn’t new Donn Parker’s seminal 1978 book Crime by Computer estimated that 95% of computer attacks were committed by authorized users of the system... behavior on the part of employees 1 Introduction In June 2007 the U.S Army Research Office, the Financial Services Technology Consortium (FSTC) and the Institute for Information Infrastructure Protection (I3P) sponsored a workshop on insiderattack and cybersecurityThe two-day event featured participants from academia, research institutions, consulting firms, industry, and the government Thesecurity . describing the state of the art in insider attack detection, in- cluding a proposal for hardware support for preventing insider attack and an over- view of the state-of -the- art in masquerade attack. Fairfax VA 2203 0-4 444, USA jajodia@gmu.edu Library of Congress Control Number: 2008921346 ISBN-13: 97 8-0 -3 8 7-7 732 1-6 e-ISBN-13: 97 8-0 -3 8 7-7 732 2-3 Advances in Information Security series:. Abhishek Singh; ISBN: 97 8-0 -3 8 7-7 438 9-9 BOTNET DETECTION: Countering the Largest Security Threat edited by Wenke Lee, Cliff Wang and David Dagon; ISBN: 97 8-0 -3 8 7-6 876 6-7 PRIVACY-RESPECTING INTRUSION