Insider Threats
From Computing and Software Wiki
(→Background Checks) |
(→Background Checks) |
||
Line 18: | Line 18: | ||
==Preventions== | ==Preventions== | ||
===Background Checks=== | ===Background Checks=== | ||
- | Several organizations do not perform adequate background verification on their new employees. Screening new employees properly, such as reference checks or criminal records, can reduce the probability of an organization hiring individuals that may be an insider threat. Background checks should be performed for all individuals who are given access to an organization's sensitive materials even if they are not directly employed by the organizations (e.g.: Contractors). | + | Several organizations do not perform adequate background verification on their new employees. Screening new employees properly, such as reference checks or inspecting criminal records, can reduce the probability of an organization hiring individuals that may be an insider threat. Background checks should be performed for all individuals who are given access to an organization's sensitive materials even if they are not directly employed by the organizations (e.g.: Contractors). |
===Monitoring Employee Behaviour=== | ===Monitoring Employee Behaviour=== |
Revision as of 00:55, 25 March 2008
Definition
Contents |
Overview of Insider Threats
Etc
Sources of Insider Threats
Employees
Employees of an organization are amongst the greatest risk in terms of access to and potential harm with an organization’s sensitive material. Organizations typically assume that they can trust their employees. They believe that their employees are primarily interested in the productivity and successfulness of the organization. Therefore they are not considered to be of any possible danger and are considered last when a leak of sensitive material has occurred.
Contractors
Info
Former Employees
Former employees who pose a threat to their former organization are typically disgruntled employees. They believe that the organization has “done them wrong” and feel that revenge is justified. They are able to gain access to sensitive material either:
- Directly: Through a back door. If an employee fears termination, he or she may prepare a backdoor access or alternative usernames and passwords in order to gain entry. They may also begin collecting proprietary data for later use.
- Indirectly: Through former associates. A former associate may create a back door access for the former employee or may provide him or her with proprietary information.
Preventions
Background Checks
Several organizations do not perform adequate background verification on their new employees. Screening new employees properly, such as reference checks or inspecting criminal records, can reduce the probability of an organization hiring individuals that may be an insider threat. Background checks should be performed for all individuals who are given access to an organization's sensitive materials even if they are not directly employed by the organizations (e.g.: Contractors).
Monitoring Employee Behaviour
Restrictions on Remote Access
Enforcing the Principle of Least Privlege
Monitoring Electronic Outbound with Software
References
- Background checks
- Monitoring employee behaviour
- Restrict accounts
- Restrict the scope of remote access
- Enforce the principle of least privlege
[[1]]