SlideShare uma empresa Scribd logo
1 de 11
Insider Threat Research
The Insider Threat Center in the CERT (Computer Emergency
Response Team) is considered to be a highly trusted broker to help
community in both short & long term through the researches. The
real insider threat cases were gathered from different public
resources such as news media and industry reports. This center
conducts research and analysis to develop Socio-Technical
solutions and answer to fight those insider cyber threats.
Case Analysis
• Since 2002, the Insider Threat Study team has collaborated
with the U.S. Secret Service to identify, assess, and manage
potential threats to, and vulnerabilities of, data and critical
systems. This work augments security and protective practices
by:
– finding ways to identify, assess, and mitigate cybersecurity threats to
data and critical systems that impact physical security or threaten the
mission of organizations
– finding ways to identify, assess, and manage individuals who may pose
a threat to those data or critical systems
– developing information and tools that can help organizations and law
enforcement identify cybersecurity issues
• The Insider Threat Study is a central component of the
multi-year collaboration between the Secret Service
and the CERT Division. The study focuses on employees
who use or exceed their authorized access to their
organization's information systems to harm the
organization by stealing intellectual property or other
confidential or sensitive information, by committing
fraud, or by sabotaging information technology within
critical infrastructure sectors. The study was the first
comprehensive analysis of the insider threat problem
and has led to analyses of several different public and
private sectors.
Vulnerability Assessments
• A confidential Insider Threat Vulnerability Assessment helps you
understand your exposure to insider threat along multiple vectors
(technical, behavioral, process, and policy) and delivers a single
actionable framework to manage these issues and associated risks.
• The assessment instrument, which is based on more than 550
insider threat cases in our database, encompasses information
technology, human resources, physical security, business processes,
legal, management, and organizational issues. It merges technical,
behavioral, process, and policy issues into a single, actionable
framework.
• Members of the Insider Threat Center staff spend three to five days
at your organization. During that time, we review documents,
interview key personnel in your organization, and observe key
processes and security issues. We sign non-disclosure agreements,
and all collaborations are confidential.
• After the onsite visit, we provide you with a confidential report that
contains the findings of the assessment and considerations for
potential mitigation strategies. Organizations have used this report
to
– identify and implement short-term tactical countermeasures
– help guide their ongoing risk management process for implementing
long-term, strategic countermeasures
– justify follow-up actions to key decision makers
• The CERT insider threat vulnerability assessment, which is based on
psychological and technical expertise, helps you to better safeguard
your critical infrastructure. The purpose of the assessment is to
– enable you to gain a better understanding of your vulnerability to
insider threats and an enhanced ability to assess and manage
associated risks
– include technical, organizational, personnel, and business security and
process issues from our research in a single, actionable framework
– benefit all individuals involved in the insider threat vulnerability
assessment process: information technology, human resources,
physical security, data and business process owners, and all levels of
organizational management
• The insider threat can come in several forms:
– Employees who steal intellectual property
– Unhappy IT professionals who damage data and
systems
– Professionals who use confidential information for
financial or political gain
Behavior Monitoring
• A history of disregarding rules and regulations
• Participating in questionable activities; enticing others
to participate in them
• A history of deception or lying to supervisors or co-
workers
• Argumentative behavior towards peers and supervisors
• Previous attempts to avoid or defeat security audits
and/or security systems
• Coming to office under the influence of drugs/alcohol
• Threatening to use violence
Dealing with Potential Defectors
• Here is a step by step approach for improving behavioral monitoring, preventing defection, and
appropriately handling defectors.
• Ensure employees know all that they must know. A company must ensure that its employees
know and completely understand the company’s policy in respect to use of information resources
and employee behavior.
• Additional monitoring for potential defectors. An unsatisfied employee may be tempted in
destroying, stealing, or sharing confidential data if he or she feels sidelined or unappreciated.
Organizations can prevent such incidences by identifying potential defectors and monitoring them.
• Train employees to detect suspicious behavior. All employees must be adequately trained to
detect suspicious behavior. Equally importantly, they must be made to understand the need of
promptly bringing such behavior to the notice of authorities.
• Safeguard the interests of the whistleblowers. Employees often don’t want to become personally
involved, so a mechanism should be in place that protects their anonymity. This can be achieved in
different ways, for instance, by installing a toll-free number for registering tips to suspect behavior.
• Take prompt and adequate action. Organizations should respond quickly to any breach of faith and
the response should be in line with the level of the offense. Remediating the problem should be the
first preference, rather than termination, which can lead to litigations if used without much
deliberation.
Technical Monitoring
• Need-to-know
• Least privilege
• Separation of duties
Administration
• The controls discussed above work to mitigate suspicious
activities by IT administrators, but they alone are not
sufficient. This is because administrators enjoy privileges
that other employees don’t. For instance, administrators, if
they want to, can create backdoor accounts or tweak logs.
Both vulnerabilities can be effectively eliminated with aid
of monitoring duties and separation of duties.
• to nullify insider threats from administrators
– Log the use of a shared admin account every time
– Change passwords of all shared accounts every time an
administrator leaves the organization
– If budget allows, use a password-management solution
CERT Related Controls & Indicators
• In organizations with access to the internet, the potential for data
leakage is ever present. The insider threat control described in this
technical note can monitor web request traffic for text-based data
exfiltration attempts and block them in real time. Using this control
can help an organization protect text-based intellectual property,
including source code repositories.
• As part of the plagiarism detection control, the Insider Threat team
offers two control systems code samples:
– WebDLPIndexer, a Java agent, assists with the implementation of the
team's data loss prevention (DLP) control
– WebDLP Client forwards outgoing web requests to the WebDLPIndexer
agent for comparison against an index of intellectual property.

Mais conteúdo relacionado

Mais procurados

Security Architecture
Security ArchitectureSecurity Architecture
Security Architecture
Priyank Hada
 
Simplifying the data privacy governance quagmire building automated privacy ...
Simplifying the data privacy governance quagmire  building automated privacy ...Simplifying the data privacy governance quagmire  building automated privacy ...
Simplifying the data privacy governance quagmire building automated privacy ...
Avinash Ramineni
 

Mais procurados (20)

Security Architecture
Security ArchitectureSecurity Architecture
Security Architecture
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
Network Security: Physical security
Network Security: Physical security Network Security: Physical security
Network Security: Physical security
 
Business information security requirements
Business information security requirementsBusiness information security requirements
Business information security requirements
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
 
Cisa 2013 ch5
Cisa 2013 ch5Cisa 2013 ch5
Cisa 2013 ch5
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
Information risk management
Information risk managementInformation risk management
Information risk management
 
Cisa 2013 ch2
Cisa 2013 ch2Cisa 2013 ch2
Cisa 2013 ch2
 
The Insider's Guide to the Insider Threat
The Insider's Guide to the Insider ThreatThe Insider's Guide to the Insider Threat
The Insider's Guide to the Insider Threat
 
Cisa 2013 ch4
Cisa 2013 ch4Cisa 2013 ch4
Cisa 2013 ch4
 
Risk Management and Security in Strategic Planning
Risk Management and Security in Strategic PlanningRisk Management and Security in Strategic Planning
Risk Management and Security in Strategic Planning
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset Security
 
Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?
 
Simplifying the data privacy governance quagmire building automated privacy ...
Simplifying the data privacy governance quagmire  building automated privacy ...Simplifying the data privacy governance quagmire  building automated privacy ...
Simplifying the data privacy governance quagmire building automated privacy ...
 
Cisa 2013 ch3
Cisa 2013 ch3Cisa 2013 ch3
Cisa 2013 ch3
 
CISSP Chapter 1 Risk Management
CISSP Chapter 1  Risk ManagementCISSP Chapter 1  Risk Management
CISSP Chapter 1 Risk Management
 
Ch2 cism 2014
Ch2 cism 2014Ch2 cism 2014
Ch2 cism 2014
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
task 1
task 1task 1
task 1
 

Destaque

Managing insider threat
Managing insider threatManaging insider threat
Managing insider threat
milliemill
 

Destaque (6)

Managing insider threat
Managing insider threatManaging insider threat
Managing insider threat
 
Countering insider threat attacks - CDE themed call launch 14 May 2013
Countering insider threat attacks - CDE themed call launch 14 May 2013Countering insider threat attacks - CDE themed call launch 14 May 2013
Countering insider threat attacks - CDE themed call launch 14 May 2013
 
Insider Threat Experiences
Insider Threat ExperiencesInsider Threat Experiences
Insider Threat Experiences
 
Insider Threat – The Visual Conviction - FIRST 2007 - Sevilla
Insider Threat – The Visual Conviction - FIRST 2007 - SevillaInsider Threat – The Visual Conviction - FIRST 2007 - Sevilla
Insider Threat – The Visual Conviction - FIRST 2007 - Sevilla
 
Internal Risk Management
Internal Risk ManagementInternal Risk Management
Internal Risk Management
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRI
 

Semelhante a insider threat research

Dancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehDancyrityshy 1foundatioieh
Dancyrityshy 1foundatioieh
Anne Starr
 
Overview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptxOverview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptx
JoshJaro
 
Information security background
Information security backgroundInformation security background
Information security background
Nicholas Davis
 
The Basics of Security and Risk Analysis
The Basics of Security and Risk AnalysisThe Basics of Security and Risk Analysis
The Basics of Security and Risk Analysis
learfield
 
DIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxDIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docx
cuddietheresa
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of Interest
Matthew Rosenquist
 

Semelhante a insider threat research (20)

The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
Module 3_Lesson 7.pptx
Module 3_Lesson 7.pptxModule 3_Lesson 7.pptx
Module 3_Lesson 7.pptx
 
crisc_wk_2a.pptx
crisc_wk_2a.pptxcrisc_wk_2a.pptx
crisc_wk_2a.pptx
 
it grc
it grc it grc
it grc
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROL
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 
Dancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehDancyrityshy 1foundatioieh
Dancyrityshy 1foundatioieh
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptx
 
Overview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptxOverview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptx
 
Information security background
Information security backgroundInformation security background
Information security background
 
crisc_wk_5.pptx
crisc_wk_5.pptxcrisc_wk_5.pptx
crisc_wk_5.pptx
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2
 
The Basics of Security and Risk Analysis
The Basics of Security and Risk AnalysisThe Basics of Security and Risk Analysis
The Basics of Security and Risk Analysis
 
DIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxDIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docx
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of Interest
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdf
 
Implementing Asset Management System with ISO 55001
Implementing Asset Management System with ISO 55001Implementing Asset Management System with ISO 55001
Implementing Asset Management System with ISO 55001
 
Cybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesCybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial Services
 

Último

Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
Diya Sharma
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Último (20)

Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
 
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft DatingDubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 

insider threat research

  • 1. Insider Threat Research The Insider Threat Center in the CERT (Computer Emergency Response Team) is considered to be a highly trusted broker to help community in both short & long term through the researches. The real insider threat cases were gathered from different public resources such as news media and industry reports. This center conducts research and analysis to develop Socio-Technical solutions and answer to fight those insider cyber threats.
  • 2. Case Analysis • Since 2002, the Insider Threat Study team has collaborated with the U.S. Secret Service to identify, assess, and manage potential threats to, and vulnerabilities of, data and critical systems. This work augments security and protective practices by: – finding ways to identify, assess, and mitigate cybersecurity threats to data and critical systems that impact physical security or threaten the mission of organizations – finding ways to identify, assess, and manage individuals who may pose a threat to those data or critical systems – developing information and tools that can help organizations and law enforcement identify cybersecurity issues
  • 3. • The Insider Threat Study is a central component of the multi-year collaboration between the Secret Service and the CERT Division. The study focuses on employees who use or exceed their authorized access to their organization's information systems to harm the organization by stealing intellectual property or other confidential or sensitive information, by committing fraud, or by sabotaging information technology within critical infrastructure sectors. The study was the first comprehensive analysis of the insider threat problem and has led to analyses of several different public and private sectors.
  • 4. Vulnerability Assessments • A confidential Insider Threat Vulnerability Assessment helps you understand your exposure to insider threat along multiple vectors (technical, behavioral, process, and policy) and delivers a single actionable framework to manage these issues and associated risks. • The assessment instrument, which is based on more than 550 insider threat cases in our database, encompasses information technology, human resources, physical security, business processes, legal, management, and organizational issues. It merges technical, behavioral, process, and policy issues into a single, actionable framework. • Members of the Insider Threat Center staff spend three to five days at your organization. During that time, we review documents, interview key personnel in your organization, and observe key processes and security issues. We sign non-disclosure agreements, and all collaborations are confidential.
  • 5. • After the onsite visit, we provide you with a confidential report that contains the findings of the assessment and considerations for potential mitigation strategies. Organizations have used this report to – identify and implement short-term tactical countermeasures – help guide their ongoing risk management process for implementing long-term, strategic countermeasures – justify follow-up actions to key decision makers • The CERT insider threat vulnerability assessment, which is based on psychological and technical expertise, helps you to better safeguard your critical infrastructure. The purpose of the assessment is to – enable you to gain a better understanding of your vulnerability to insider threats and an enhanced ability to assess and manage associated risks – include technical, organizational, personnel, and business security and process issues from our research in a single, actionable framework – benefit all individuals involved in the insider threat vulnerability assessment process: information technology, human resources, physical security, data and business process owners, and all levels of organizational management
  • 6. • The insider threat can come in several forms: – Employees who steal intellectual property – Unhappy IT professionals who damage data and systems – Professionals who use confidential information for financial or political gain
  • 7. Behavior Monitoring • A history of disregarding rules and regulations • Participating in questionable activities; enticing others to participate in them • A history of deception or lying to supervisors or co- workers • Argumentative behavior towards peers and supervisors • Previous attempts to avoid or defeat security audits and/or security systems • Coming to office under the influence of drugs/alcohol • Threatening to use violence
  • 8. Dealing with Potential Defectors • Here is a step by step approach for improving behavioral monitoring, preventing defection, and appropriately handling defectors. • Ensure employees know all that they must know. A company must ensure that its employees know and completely understand the company’s policy in respect to use of information resources and employee behavior. • Additional monitoring for potential defectors. An unsatisfied employee may be tempted in destroying, stealing, or sharing confidential data if he or she feels sidelined or unappreciated. Organizations can prevent such incidences by identifying potential defectors and monitoring them. • Train employees to detect suspicious behavior. All employees must be adequately trained to detect suspicious behavior. Equally importantly, they must be made to understand the need of promptly bringing such behavior to the notice of authorities. • Safeguard the interests of the whistleblowers. Employees often don’t want to become personally involved, so a mechanism should be in place that protects their anonymity. This can be achieved in different ways, for instance, by installing a toll-free number for registering tips to suspect behavior. • Take prompt and adequate action. Organizations should respond quickly to any breach of faith and the response should be in line with the level of the offense. Remediating the problem should be the first preference, rather than termination, which can lead to litigations if used without much deliberation.
  • 9. Technical Monitoring • Need-to-know • Least privilege • Separation of duties
  • 10. Administration • The controls discussed above work to mitigate suspicious activities by IT administrators, but they alone are not sufficient. This is because administrators enjoy privileges that other employees don’t. For instance, administrators, if they want to, can create backdoor accounts or tweak logs. Both vulnerabilities can be effectively eliminated with aid of monitoring duties and separation of duties. • to nullify insider threats from administrators – Log the use of a shared admin account every time – Change passwords of all shared accounts every time an administrator leaves the organization – If budget allows, use a password-management solution
  • 11. CERT Related Controls & Indicators • In organizations with access to the internet, the potential for data leakage is ever present. The insider threat control described in this technical note can monitor web request traffic for text-based data exfiltration attempts and block them in real time. Using this control can help an organization protect text-based intellectual property, including source code repositories. • As part of the plagiarism detection control, the Insider Threat team offers two control systems code samples: – WebDLPIndexer, a Java agent, assists with the implementation of the team's data loss prevention (DLP) control – WebDLP Client forwards outgoing web requests to the WebDLPIndexer agent for comparison against an index of intellectual property.