SlideShare una empresa de Scribd logo
1 de 16
The Insider versus External Threat
Zhi Hao Chen(30113181)
Pavan Geddam(30127867)
Sasidhar Bandla(30121080)
The Insider Threat
• What is insider threat?
An insider threat is generally defined as a current or former
employee, contractor, or other business partner who has or had
authorized access to an organization's network, system, or data and
intentionally misused that access to negatively affect the
confidentiality, integrity, or availability of the organization's
information or information systems. Insiders do not always act alone
and may not be aware they are aiding a threat actor (i.e. the
unintentional insider threat).
The Insider Threat
• Some characteristics of Insiders
at Risk of Becoming a Threat
1. Greed/ financial need
2. Reduced loyalty
3. Pattern of frustration and disappointment
4. Inability to assume responsibility for their actions
The Insider Threat
How to know who is insider
Acting differently
Download or copy more information from the company
than they should know
Working long hours than others
The Insider Threat
Decrease insider threat
• Training employees to recognize phishing and other
social media threat vectors
• Train continuously to maintain the proper levels of
knowledge skills and abilities
• Maintain staff values and attitudes that align with
organizational mission and ethics
• Improve usability of security tools
• Improve usability of software to reduce the likelihood
of system-induced human error
The Insider Threat
 Defend your organisation from insider crime by:
• Effective supervision – set the tone from the top
• An anti-fraud strategy, tailored to the needs of the particular
organisation
• Listening to staff concerns and encouraging them to speak up
• Looking for weaknesses in controls and systems
• Technical controls such as server room audit trails and disabled
USB access to prevent data theft
• Effective pre-employment screening
• Disabling access privileges on termination of employment
• Be honest – report fraud, prosecute if necessary and give truthful
references for employees
External Threat
•External threats are anything
from your organization's outside
environment that can adversely
affect its performance or
achievement of its goals.
Ironically, stronger organizations
can be exposed to a greater level
of threats than weaker
organizations because success
breeds envy and competition to
take what your organization has
achieved.
External Threat
An external threat includes:
•individuals outside an organization
attempting to gain
unauthorized access to an
organization’s networks using the
Internet, other networks, or dial-up
modems.
•flooding a network with large
volumes of access requests so that
the network is unable to respond to
legitimate requests, one type of
denial-of-service attack.
External Threat
External Accidents
•Modern business computer systems are large and distributed. In
addition to an organization’s internal network, many important
components reside on the public Internet. This means that a complex
chain of events can affect an IT database in unpredictable ways. For
example, a heavy storm in one region of the country can cut power to a
server that stores software licenses for other servers. With licenses
unavailable, database backup software may not function at its
scheduled time, leaving the database open to irreversible corruption.
External Threat
External Attacks
•The most frightening attacks come from skilled and sophisticated
external hackers. These attackers can find network vulnerabilities or
socially manipulate insiders to get past outer network defenses. Since
an organization’s software applications maintain open connections to
IT databases, hackers seek to take control of these applications after
they get inside, often by seeking application passwords set to their
defaults
Insider Vs External Threats
•A threat originating outside a
company, government agency, or
institution. In contrast, an internal
threat is one originating inside the
organization.
•The relative susceptibility to
insider- and outsider-originated
attacks depends on many factors.
Let’s discuss some of them
Insider Vs External Threats
• Only 39 percent of survey
respondents said they were
victims of a cyberattack
• 16% were attacked from an
external source
• 13% were attacked from an
internal source
• 10% were attacked from both
internal and external sources
• 61% reported that they were
not attacked
Insider Vs External Threats
• Personnel security. Some organizations carefully screen all
personnel before they are allowed access to computing systems, to
determine whether their background is sufficiently unblemished to
merit trust in them. Good personnel security substantially diminishes
the threat of an insider attack.
• Network architecture. Networks that have traffic screening and
security management barriers generally provide less opportunity for
outsider attacks than do those that do not. Multiple entry points (as
opposed to a single entry point) into a network are more conducive
to outsider attacks.
Insider Vs External Threats
• Intrusion detection capabilities. Deploying intrusion detection
tools appropriately and taking the time to carefully investigate the
data they provide can also affect the relative proportion of insider
versus outsider attacks. Most of today's commercial intrusion
detection tools are better at discovering outsider attacks. Most
current attacks on networks and the systems therein do not occur at
a single point in time, they often occur over a period of days, weeks
and even months. Intrusion detection tools can help shut these
attacks off by enabling an organization to discover an attack early,
thereby enabling network and security administrators to change
packet-filtering rules, disconnect target machines from the network,
and take other evasive measures to prevent further, successful
attacks. The overall result is less likelihood of outsider attacks
(although insider attacks can also be reduced in a similar manner).
References
• https://www.us-cert.gov/sites/default/files/publications/Combating%20the%20Insider
%20Threat_0.pdf
• http://www.thesecurityco.com/media/40631/Whitepaper-insider-threat_January2013.pdf
• http://www.yourdictionary.com/external-threat
• http://education-portal.com/academy/lesson/external-opportunities-threats-in-swot-analysis-
examples-definition-quiz.html#lesson
• http://itlaw.wikia.com/wiki/External_threat
• http://searchsecurity.techtarget.com/tip/The-worse-of-two-evils-Internal-vs-external-security-
threats
• http://www.integritysrc.com/blog/223-internal-vs-external-threats-which-one-worries-you-more
• http://smallbusiness.chron.com/difference-between-internal-external-threats-database-
74165.html
• https://www.saintcorporation.com/solutions/smallBusiness.html
Question time!!!
Thank you~~~

Más contenido relacionado

La actualidad más candente

Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering BasicsLuke Rusten
 
Social Engineering new.pptx
Social Engineering new.pptxSocial Engineering new.pptx
Social Engineering new.pptxSanthosh Prabhu
 
Social engineering
Social engineeringSocial engineering
Social engineeringRobert Hood
 
Attack Simulation and Hunting
Attack Simulation and HuntingAttack Simulation and Hunting
Attack Simulation and Huntingnathi mogomotsi
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageMarin Ivezic
 
Machine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Machine Learning & Cyber Security: Detecting Malicious URLs in the HaystackMachine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Machine Learning & Cyber Security: Detecting Malicious URLs in the HaystackAlistair Gillespie
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness trainingAbdalrhmanTHassan
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...ABHAY PATHAK
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.Pratum
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?JamRivera1
 

La actualidad más candente (20)

Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering Basics
 
Social Engineering new.pptx
Social Engineering new.pptxSocial Engineering new.pptx
Social Engineering new.pptx
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Attack Simulation and Hunting
Attack Simulation and HuntingAttack Simulation and Hunting
Attack Simulation and Hunting
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
 
Social engineering
Social engineering Social engineering
Social engineering
 
Insider threat
Insider threatInsider threat
Insider threat
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Machine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Machine Learning & Cyber Security: Detecting Malicious URLs in the HaystackMachine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Machine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Insider threat v3
Insider threat v3Insider threat v3
Insider threat v3
 

Destacado

IKA - Kursus om evalueringsmodeller i praksis - 9. april 2014
IKA - Kursus om evalueringsmodeller i praksis - 9. april 2014IKA - Kursus om evalueringsmodeller i praksis - 9. april 2014
IKA - Kursus om evalueringsmodeller i praksis - 9. april 2014Andreas Christensen
 
Роль подсказки при выборах в вербальных задачах, предполагающих использование...
Роль подсказки при выборах в вербальных задачах, предполагающих использование...Роль подсказки при выборах в вербальных задачах, предполагающих использование...
Роль подсказки при выборах в вербальных задачах, предполагающих использование...evkrasnov
 
Arona dison checet case study
Arona dison checet case studyArona dison checet case study
Arona dison checet case studyArona Dison
 
Udbudsretlig update 2013 – året der gik!
Udbudsretlig update 2013 – året der gik!Udbudsretlig update 2013 – året der gik!
Udbudsretlig update 2013 – året der gik!Andreas Christensen
 
Libs602 presentationkthrough2tools
Libs602 presentationkthrough2toolsLibs602 presentationkthrough2tools
Libs602 presentationkthrough2toolsMelissa Casey
 
AFP Presentation:Tools to Assist Non-Profits Annual Appeals
AFP Presentation:Tools to Assist Non-Profits Annual AppealsAFP Presentation:Tools to Assist Non-Profits Annual Appeals
AFP Presentation:Tools to Assist Non-Profits Annual AppealsFrank C. Hudetz
 
Presentation2
Presentation2Presentation2
Presentation2Sai Talla
 
The insider versus external threat
The insider versus external threatThe insider versus external threat
The insider versus external threatzhihaochen
 

Destacado (14)

IKA - Kursus om evalueringsmodeller i praksis - 9. april 2014
IKA - Kursus om evalueringsmodeller i praksis - 9. april 2014IKA - Kursus om evalueringsmodeller i praksis - 9. april 2014
IKA - Kursus om evalueringsmodeller i praksis - 9. april 2014
 
Slideshare
SlideshareSlideshare
Slideshare
 
Роль подсказки при выборах в вербальных задачах, предполагающих использование...
Роль подсказки при выборах в вербальных задачах, предполагающих использование...Роль подсказки при выборах в вербальных задачах, предполагающих использование...
Роль подсказки при выборах в вербальных задачах, предполагающих использование...
 
Arona dison checet case study
Arona dison checet case studyArona dison checet case study
Arona dison checet case study
 
remate
remateremate
remate
 
Que es anáglifo
Que es anáglifoQue es anáglifo
Que es anáglifo
 
Udbudsretlig update 2013 – året der gik!
Udbudsretlig update 2013 – året der gik!Udbudsretlig update 2013 – året der gik!
Udbudsretlig update 2013 – året der gik!
 
Pixeles en photoshop
Pixeles en photoshopPixeles en photoshop
Pixeles en photoshop
 
:Udbudsretten - året der gik!
:Udbudsretten - året der gik!:Udbudsretten - året der gik!
:Udbudsretten - året der gik!
 
Libs602 presentationkthrough2tools
Libs602 presentationkthrough2toolsLibs602 presentationkthrough2tools
Libs602 presentationkthrough2tools
 
Slideshare
SlideshareSlideshare
Slideshare
 
AFP Presentation:Tools to Assist Non-Profits Annual Appeals
AFP Presentation:Tools to Assist Non-Profits Annual AppealsAFP Presentation:Tools to Assist Non-Profits Annual Appeals
AFP Presentation:Tools to Assist Non-Profits Annual Appeals
 
Presentation2
Presentation2Presentation2
Presentation2
 
The insider versus external threat
The insider versus external threatThe insider versus external threat
The insider versus external threat
 

Similar a The insider versus external threat

Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badbanerjeea
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?CBIZ, Inc.
 
Countering Advanced Persistent Threats
Countering Advanced Persistent ThreatsCountering Advanced Persistent Threats
Countering Advanced Persistent ThreatsBooz Allen Hamilton
 
Internal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackInternal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackMekhi Da ‘Quay Daniels
 
Insider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdfInsider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdframsetl
 
Why Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level PriorityWhy Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level PriorityDavid Mai, MBA
 
Why Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level PriorityWhy Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level PriorityObserveIT
 
Threats in network that can be noted in security
Threats in network that can be noted in securityThreats in network that can be noted in security
Threats in network that can be noted in securityssuserec53e73
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecurityImperva
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligenceMarlabs
 
Benefit from Penetration Testing Certification
Benefit from Penetration Testing CertificationBenefit from Penetration Testing Certification
Benefit from Penetration Testing Certificationshanaadams190
 
Insider threats
Insider threatsInsider threats
Insider threatsizoologic
 
Top Companies Providing Cyber Security in Europe
Top Companies Providing Cyber Security in EuropeTop Companies Providing Cyber Security in Europe
Top Companies Providing Cyber Security in Europeroxanaaleena
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing Netpluz Asia Pte Ltd
 
FBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareFBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareDavid Sweigert
 
Synack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack
 

Similar a The insider versus external threat (20)

Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-bad
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
 
Countering Advanced Persistent Threats
Countering Advanced Persistent ThreatsCountering Advanced Persistent Threats
Countering Advanced Persistent Threats
 
Internal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackInternal Threats: The New Sources of Attack
Internal Threats: The New Sources of Attack
 
COMPUTER APPLICATIONS Module 4.pptx
COMPUTER APPLICATIONS Module 4.pptxCOMPUTER APPLICATIONS Module 4.pptx
COMPUTER APPLICATIONS Module 4.pptx
 
Insider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdfInsider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdf
 
Why Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level PriorityWhy Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level Priority
 
Why Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level PriorityWhy Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level Priority
 
Zero Trust.pptx
Zero Trust.pptxZero Trust.pptx
Zero Trust.pptx
 
Threats in network that can be noted in security
Threats in network that can be noted in securityThreats in network that can be noted in security
Threats in network that can be noted in security
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber Security
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Benefit from Penetration Testing Certification
Benefit from Penetration Testing CertificationBenefit from Penetration Testing Certification
Benefit from Penetration Testing Certification
 
Insider threats
Insider threatsInsider threats
Insider threats
 
Module 1.pdf
Module 1.pdfModule 1.pdf
Module 1.pdf
 
module 1 Cyber Security Concepts
module 1 Cyber Security Conceptsmodule 1 Cyber Security Concepts
module 1 Cyber Security Concepts
 
Top Companies Providing Cyber Security in Europe
Top Companies Providing Cyber Security in EuropeTop Companies Providing Cyber Security in Europe
Top Companies Providing Cyber Security in Europe
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
 
FBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareFBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from Ransomware
 
Synack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack cirtical infrasructure webinar
Synack cirtical infrasructure webinar
 

Último

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 

Último (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

The insider versus external threat

  • 1. The Insider versus External Threat Zhi Hao Chen(30113181) Pavan Geddam(30127867) Sasidhar Bandla(30121080)
  • 2. The Insider Threat • What is insider threat? An insider threat is generally defined as a current or former employee, contractor, or other business partner who has or had authorized access to an organization's network, system, or data and intentionally misused that access to negatively affect the confidentiality, integrity, or availability of the organization's information or information systems. Insiders do not always act alone and may not be aware they are aiding a threat actor (i.e. the unintentional insider threat).
  • 3. The Insider Threat • Some characteristics of Insiders at Risk of Becoming a Threat 1. Greed/ financial need 2. Reduced loyalty 3. Pattern of frustration and disappointment 4. Inability to assume responsibility for their actions
  • 4. The Insider Threat How to know who is insider Acting differently Download or copy more information from the company than they should know Working long hours than others
  • 5. The Insider Threat Decrease insider threat • Training employees to recognize phishing and other social media threat vectors • Train continuously to maintain the proper levels of knowledge skills and abilities • Maintain staff values and attitudes that align with organizational mission and ethics • Improve usability of security tools • Improve usability of software to reduce the likelihood of system-induced human error
  • 6. The Insider Threat  Defend your organisation from insider crime by: • Effective supervision – set the tone from the top • An anti-fraud strategy, tailored to the needs of the particular organisation • Listening to staff concerns and encouraging them to speak up • Looking for weaknesses in controls and systems • Technical controls such as server room audit trails and disabled USB access to prevent data theft • Effective pre-employment screening • Disabling access privileges on termination of employment • Be honest – report fraud, prosecute if necessary and give truthful references for employees
  • 7. External Threat •External threats are anything from your organization's outside environment that can adversely affect its performance or achievement of its goals. Ironically, stronger organizations can be exposed to a greater level of threats than weaker organizations because success breeds envy and competition to take what your organization has achieved.
  • 8. External Threat An external threat includes: •individuals outside an organization attempting to gain unauthorized access to an organization’s networks using the Internet, other networks, or dial-up modems. •flooding a network with large volumes of access requests so that the network is unable to respond to legitimate requests, one type of denial-of-service attack.
  • 9. External Threat External Accidents •Modern business computer systems are large and distributed. In addition to an organization’s internal network, many important components reside on the public Internet. This means that a complex chain of events can affect an IT database in unpredictable ways. For example, a heavy storm in one region of the country can cut power to a server that stores software licenses for other servers. With licenses unavailable, database backup software may not function at its scheduled time, leaving the database open to irreversible corruption.
  • 10. External Threat External Attacks •The most frightening attacks come from skilled and sophisticated external hackers. These attackers can find network vulnerabilities or socially manipulate insiders to get past outer network defenses. Since an organization’s software applications maintain open connections to IT databases, hackers seek to take control of these applications after they get inside, often by seeking application passwords set to their defaults
  • 11. Insider Vs External Threats •A threat originating outside a company, government agency, or institution. In contrast, an internal threat is one originating inside the organization. •The relative susceptibility to insider- and outsider-originated attacks depends on many factors. Let’s discuss some of them
  • 12. Insider Vs External Threats • Only 39 percent of survey respondents said they were victims of a cyberattack • 16% were attacked from an external source • 13% were attacked from an internal source • 10% were attacked from both internal and external sources • 61% reported that they were not attacked
  • 13. Insider Vs External Threats • Personnel security. Some organizations carefully screen all personnel before they are allowed access to computing systems, to determine whether their background is sufficiently unblemished to merit trust in them. Good personnel security substantially diminishes the threat of an insider attack. • Network architecture. Networks that have traffic screening and security management barriers generally provide less opportunity for outsider attacks than do those that do not. Multiple entry points (as opposed to a single entry point) into a network are more conducive to outsider attacks.
  • 14. Insider Vs External Threats • Intrusion detection capabilities. Deploying intrusion detection tools appropriately and taking the time to carefully investigate the data they provide can also affect the relative proportion of insider versus outsider attacks. Most of today's commercial intrusion detection tools are better at discovering outsider attacks. Most current attacks on networks and the systems therein do not occur at a single point in time, they often occur over a period of days, weeks and even months. Intrusion detection tools can help shut these attacks off by enabling an organization to discover an attack early, thereby enabling network and security administrators to change packet-filtering rules, disconnect target machines from the network, and take other evasive measures to prevent further, successful attacks. The overall result is less likelihood of outsider attacks (although insider attacks can also be reduced in a similar manner).
  • 15. References • https://www.us-cert.gov/sites/default/files/publications/Combating%20the%20Insider %20Threat_0.pdf • http://www.thesecurityco.com/media/40631/Whitepaper-insider-threat_January2013.pdf • http://www.yourdictionary.com/external-threat • http://education-portal.com/academy/lesson/external-opportunities-threats-in-swot-analysis- examples-definition-quiz.html#lesson • http://itlaw.wikia.com/wiki/External_threat • http://searchsecurity.techtarget.com/tip/The-worse-of-two-evils-Internal-vs-external-security- threats • http://www.integritysrc.com/blog/223-internal-vs-external-threats-which-one-worries-you-more • http://smallbusiness.chron.com/difference-between-internal-external-threats-database- 74165.html • https://www.saintcorporation.com/solutions/smallBusiness.html