Assessing insider threats to information security using technical, behavioural and organisational measures

Kuheli Roy Sarkar
{"title":"Assessing insider threats to information security using technical, behavioural and organisational measures","authors":"Kuheli Roy Sarkar","doi":"10.1016/j.istr.2010.11.002","DOIUrl":null,"url":null,"abstract":"<div><p>The UK government took a bruising in the headlines <em>(Sep 2008) after a Home Office contractor</em> lost a USB stick containing unencrypted data on all 84,000 prisoners in England and Wales. As a result, <em>the Home Office terminated the £1.5 million contract with the management consultancy firm</em>.</p><p>The world woke up to the largest attempted bank fraud ever when the UK’s National Hi-Tech Crime Unit foiled the world’s largest potential bank robbery in March 2005. With the help of the security supervisor, thieves masquerading as cleaning staff installed hardware keystroke loggers on computers within <em>the London branch of a Japanese bank, to steal £220m</em>.</p><p>It is indeed sobering to imagine that any organisation could fall victim to such events and the damage an insider can do. The consulting firm lost the contract worth £1.5 million due to a small mistake by an employee. The London branch of the Japanese Bank would have lost £220 million had not the crime been foiled.</p><p>Insider threat is a reality. Insiders commit fraud or steal sensitive information when motivated by money or revenge. Well-meaning employees can compromise the security of an organisation with their overzealousness in getting their job done. Every organisation has a varied mix of employees, consultants, management, partners and complex infrastructure and that makes handling insider threats a daunting challenge. With insider attacks, organisations face potential damage through loss of revenue, loss of reputation, loss of intellectual property or even loss of human life.</p><p>The insider threat problem is more elusive and perplexing than any other threat. Assessing the insider threat is the first step to determine the likelihood of any insider attack. Technical solutions do not suffice since insider threats are fundamentally a people issue. Therefore, a three-pronged approach - technological, behavioural and organisational assessment is essential in facilitating the prediction of insider threats and pre-empt any insider attack thus improving the organization’s security, survivability, and resiliency in light of insider threats.</p></div>","PeriodicalId":100669,"journal":{"name":"Information Security Technical Report","volume":"15 3","pages":"Pages 112-133"},"PeriodicalIF":0.0000,"publicationDate":"2010-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.istr.2010.11.002","citationCount":"129","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Security Technical Report","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1363412710000488","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 129

Abstract

The UK government took a bruising in the headlines (Sep 2008) after a Home Office contractor lost a USB stick containing unencrypted data on all 84,000 prisoners in England and Wales. As a result, the Home Office terminated the £1.5 million contract with the management consultancy firm.

The world woke up to the largest attempted bank fraud ever when the UK’s National Hi-Tech Crime Unit foiled the world’s largest potential bank robbery in March 2005. With the help of the security supervisor, thieves masquerading as cleaning staff installed hardware keystroke loggers on computers within the London branch of a Japanese bank, to steal £220m.

It is indeed sobering to imagine that any organisation could fall victim to such events and the damage an insider can do. The consulting firm lost the contract worth £1.5 million due to a small mistake by an employee. The London branch of the Japanese Bank would have lost £220 million had not the crime been foiled.

Insider threat is a reality. Insiders commit fraud or steal sensitive information when motivated by money or revenge. Well-meaning employees can compromise the security of an organisation with their overzealousness in getting their job done. Every organisation has a varied mix of employees, consultants, management, partners and complex infrastructure and that makes handling insider threats a daunting challenge. With insider attacks, organisations face potential damage through loss of revenue, loss of reputation, loss of intellectual property or even loss of human life.

The insider threat problem is more elusive and perplexing than any other threat. Assessing the insider threat is the first step to determine the likelihood of any insider attack. Technical solutions do not suffice since insider threats are fundamentally a people issue. Therefore, a three-pronged approach - technological, behavioural and organisational assessment is essential in facilitating the prediction of insider threats and pre-empt any insider attack thus improving the organization’s security, survivability, and resiliency in light of insider threats.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用技术、行为和组织措施评估对信息安全的内部威胁
2008年9月,英国内政部的一名承包商丢失了一个u盘,里面有英格兰和威尔士84000名囚犯的未加密数据,这让英国政府备受抨击。结果,内政部终止了与这家管理咨询公司150万英镑的合同。2005年3月,英国国家高科技犯罪部门挫败了世界上最大的潜在银行抢劫案,全世界都意识到这是有史以来最大的银行诈骗案。在安全主管的帮助下,窃贼伪装成清洁工,在一家日本银行伦敦分行的电脑上安装了硬件键盘记录器,窃取了2.2亿英镑。想象一下,任何组织都可能成为此类事件的受害者,以及内部人士可能造成的损害,这确实令人清醒。由于一名雇员的一个小错误,这家咨询公司失去了价值150万英镑的合同。如果这起犯罪没有被挫败,日本银行伦敦分行将损失2.2亿英镑。内部威胁是现实。内部人士在金钱或报复的驱使下会进行欺诈或窃取敏感信息。善意的员工在完成工作时过于热情,可能会危及组织的安全。每个组织都有不同的员工、顾问、管理层、合作伙伴和复杂的基础设施,这使得处理内部威胁成为一项艰巨的挑战。对于内部攻击,组织面临着收入损失、声誉损失、知识产权损失甚至人命损失等潜在损失。内部威胁问题比任何其他威胁都更加难以捉摸和令人困惑。评估内部威胁是确定任何内部攻击可能性的第一步。技术解决方案是不够的,因为内部威胁根本上是一个人的问题。因此,技术、行为和组织评估三管齐下的方法对于促进内部威胁的预测和先发制人的任何内部攻击至关重要,从而提高组织的安全性、生存能力和针对内部威胁的弹性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Analyzing settings for social identity management on Social Networking Sites: Classification, current state, and proposed developments Toward web-based information security knowledge sharing Bridging the gap between role mining and role engineering via migration guides Semantic analysis of role mining results and shadowed roles detection On measuring the parasitic backscatter of sensor-enabled UHF RFID tags
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1