SlideShare a Scribd company logo
1 of 26
Download to read offline
Social engineering, Insiders,
and Security
Christian W Probst
Technical University of Denmark
infinIT seminar om insidertrusler
NetIQ, 2015/03/12
2
What is the Problem?
•  We depend increasingly upon complex information
systems
•  Focus on the vulnerability to
–  Computer crime
–  Security attacks [RAND Report, 2004]
“The insider threat is
perhaps the greatest threat
to [society, information
system, ...]”
3
Securing Against the Inside
•  Protect against attacks from an insider
•  Insider has
– Better knowledge/information
– Better access
•  Hard or impossible to distinguish from admissible
actions
•  Little research on analysing socio-technical systems
4
What is an Insider?
•  An insider is an entity that has been legitimately
empowered with the right to access, represent, or
decide about one or more assets of the
organization’s structure.
•  A program can also be an insider
•  It is sufficient to have access to an asset containing
the asset in question
5
Example 1: The Hard Disk Example
Naive user and absent policy
In 2003, Banner Therapy employee Christina Binney, a co-
founder of the company, was discharged from her position for
“misconduct”, and instructed not to return to the office. BT
claimed she impermissibly removed a hard drive from her work
computer and took it home over the weekend to prepare for a
client meeting.
6
Example 1: The Hard Disk Example (ctd)
Naive user and absent policy
BT claimed that the removal crippled Banners operations and
placed vital data at risk. Binney explained that a customer
requested a meeting on a Friday for the following Monday
morning. To prepare, she chose to remove the entire hard drive
from her work computer, rather than to transfer the files to a
disk. At the time, BT had neither company policy about taking
work equipment home nor established computing protocols.
When Binney attempted to return to work on Monday, she was
denied access; this prevented her from returning the drive as
she claimed she had planned.
7
Example 2: The Trade Secret Example
Malicious user steals trade secrets
In 2007, FBI agents arrested two engineers, who had worked for
NetLogic Microsystems (NLM) until 2003. The two men used
money from mainland China to create and incorporate a
company for the sole purpose of exploiting the secrets they
stole. They downloaded sensitive NLM documents onto their
home computers, top-level confidential technical descriptions
in enough specificity to enable someone to produce the
technology. Together, the men accumulated the information
needed to design and produce their own lines of
microprocessors and microchips.
8
Example 2: The Trade Secret Example (ctd)
Malicious user steals trade secrets
To finance the business, the men contacted Beijing FBNI
Electronic Technology Development Company Ltd, and entered
into an agreement to develop and sell microprocessor chips.
Both men were able to access proprietary information without
exceeding their individual authorizations. Investigators
uncovered evidence that the venture capitalist had ties to the
Chinese government and military.
9
Example 3: The Tax Fraud Example
Perimeter definition and system design
H. Walters and others are accused for perpetrating the biggest
fraud in Washingtons history. Until her arrest, “Walters was a
26-year tax employee known as a problem solver with a knack
for finding solutions by using the departments antiquated and
balky computers or finding a way around them.” She allegedly
used her position to produce fake checks for bogus refunds
with fictitious names; the total is said to exceed $50 million.
10
Example 3: The Tax Fraud Example (ctd)
Perimeter definition and system design
The scheme involved Washingtons new Integrated Tax System.
During design phase, Walters “contributed to the decision that
her unit, which handled real estate tax refunds, be left out of it.”
At the time, the decision seemed to make sense for cost
reasons.
The scheme exploited several loopholes: each check was under
the threshold for requiring a supervisor’s approval, and no
action was taken to cancel the first check or confirm that it had
not already been cashed.
11
Example 4: The Cloud Provider Sysadmin
Perimeter definition
A system administrator in the facilities of a cloud provider
allegedly used a package sniffer to record the image of a
migrating virtual machine of a financial institution.
The virtual machine was migrated from one server to another,
possibly triggered by some action of the system administrator,
allowing him to capture the network traffic.
Once home, he replayed the network traffic, and reinstantiated
the virtual machine, giving him access to all the data of the VM.
12
Elements of Insider Threats
•  An owner of an asset
•  An inside entity that can access the asset
•  The possibility that the insider might do something
with which the owner does not allowed it to do
– This might be the access to the asset, or some
action using the asset
13
Possible Insider Threats
•  Accidental Insider
–  Ooops... I REALLY did not want that
•  Malicious insider
–  Motivation is to harm the organisation
–  Or personal gain
•  Unaware insider
–  Could you just do this...
–  Social engineered to do something
14
Accidental Insider
•  Hard to control
•  But potentially catastrophic consequences
–  Leaving door unlocked
–  Sending confidential files
–  ...
15
Malicious Insider
•  The "typical" insider
•  Disgruntled employee
•  Motivation, opportunity, abilities
•  Often developing over time
•  Motivation
–  Harm the organisation, revenge
–  Monetary gain
–  Make a point
16
Unaware Insider
•  Is "convinced" by an attacker to perform an action
•  Usually social engineering
•  Believes to do "the right thing" or a favor
•  Severe consequences
•  Can be anything from opening a door, providing access,
installing something
17
Can't we just detect them?
18
Detecting Inside attacker is "easy"
•  Need a concise model of human behaviour
•  Dependencies on the surroundings,
•  A sufficiently precise surveillance system, and
•  An evaluation system, that can draw the necessary
conclusions from its input.
•  Neither “easy” to realise, or in any form desirable.
•  Lack techniques to model human behaviour.
•  Surveillance systems depend on legal boundaries.
19
Containing Insider Threats
•  Three major components
–  Identification of potential insider attackers
–  Monitoring of operations
–  Training of employees
20
Identify Factors
•  Important areas are legal frameworks, policies, and human
behaviour
•  Goal: provide classifications of events and observations
•  Analyse policies to determine short-comings, contradictions,
inconsistencies, and loopholes
–  These are often exploited to realise insider attacks.
21
Monitoring
•  analyses the events in an organisation for signs of insider
threats
•  Should be adapted to the expected level of threat and the
value of assets
•  Challenge 1: ensure that the right data is collected, and that
the data can be analysed
•  Challenge 2: differentiate legal actions by legal users, illegal
actions by legal users, and illegal actions by illegal users.
–  How to deal with false positives/negatives?
22
Training
•  Important component in containing insider threats.
•  Main goal: rising awareness for insider threats.
•  Subgoals:
–  Streamline policies, detect distortions, or sharpen alertness
•  Tap into employees' knowledge about faulty policies and
workflows, insider threats, and counter measures
23
Social Engineering
•  Mix of science, psychology, and art.
•  Skillfully maneuver somebody to take action or not in some
aspect of their life.
•  Dress up as courier with heavy box, ask to open door;
•  Telephone technician;
•  Clorius technician;
•  Santa Claus;
•  Call employee, pretend to be from IT service; or many other.
24
Social Engineering
•  Works by building up a pretext.
•  Goal:
–  Make it likely that attack succeeds, and
–  Give the victim a good reason to excuse their actions to
themselves.
•  Heavy box;
•  Construct scenario of urgency based on cover story; or
•  Give reason to believe that you belong into the picture.
25
How to defend against Social Engineering
•  Perform physical security / social engineering tests.
•  Teach your employees social engineering.
–  The more they know, the easier they can identify them.
•  Create a security awareness "program"
–  Enforce regular training activities.
–  Re-enact "typical" scenarios.
•  Make employees aware of
–  The value of assets, and
–  The consequences of actions.
26
Contact
Christian W Probst
DTU Compute
Richard Petersens Plads 324
2800 Kgs. Lyngby
Email cwpr@dtu.dk
Mobil +45 26 57 32 96

More Related Content

What's hot

Cloud Computing Legal for Pennsylvania Bar Association
Cloud Computing Legal for Pennsylvania Bar AssociationCloud Computing Legal for Pennsylvania Bar Association
Cloud Computing Legal for Pennsylvania Bar AssociationAmy Larrimore
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2TechSoup Canada
 
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Dan Michaluk
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachJim Brashear
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...Casey Ellis
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSScott Suhy
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability PresentationSean Graham
 
The internet as a corporate security resource
The internet as a corporate security resourceThe internet as a corporate security resource
The internet as a corporate security resourceDan Michaluk
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Don Grauel
 
Cyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutionsCyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutionsCapri Insurance
 
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for NonprofitsWebinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for NonprofitsWithum
 
NumaanHuq_Hackfest2015
NumaanHuq_Hackfest2015NumaanHuq_Hackfest2015
NumaanHuq_Hackfest2015Numaan Huq
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentationSomya Johri
 
Dealing with the insider threat.
Dealing with the insider threat.Dealing with the insider threat.
Dealing with the insider threat.Matt Lemon
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets PersonalNicholas Davis
 

What's hot (20)

Cloud Computing Legal for Pennsylvania Bar Association
Cloud Computing Legal for Pennsylvania Bar AssociationCloud Computing Legal for Pennsylvania Bar Association
Cloud Computing Legal for Pennsylvania Bar Association
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?
 
Insider threat
Insider threatInsider threat
Insider threat
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMS
 
Insider threat v3
Insider threat v3Insider threat v3
Insider threat v3
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability Presentation
 
The internet as a corporate security resource
The internet as a corporate security resourceThe internet as a corporate security resource
The internet as a corporate security resource
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Cyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutionsCyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutions
 
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for NonprofitsWebinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
 
NumaanHuq_Hackfest2015
NumaanHuq_Hackfest2015NumaanHuq_Hackfest2015
NumaanHuq_Hackfest2015
 
Dean carey - data loss-prevention - atlseccon2011
Dean carey - data loss-prevention - atlseccon2011Dean carey - data loss-prevention - atlseccon2011
Dean carey - data loss-prevention - atlseccon2011
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Dealing with the insider threat.
Dealing with the insider threat.Dealing with the insider threat.
Dealing with the insider threat.
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets Personal
 

Similar to 02 presentation-christianprobst

- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdfRamya Nellutla
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageMarin Ivezic
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering BasicsLuke Rusten
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?CBIZ, Inc.
 
Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"abercius24
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Chris Hails
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
QuestionConsider the Citibank incident in 2005 where more than 3.9.pdf
QuestionConsider the Citibank incident in 2005 where more than 3.9.pdfQuestionConsider the Citibank incident in 2005 where more than 3.9.pdf
QuestionConsider the Citibank incident in 2005 where more than 3.9.pdfinfomalad
 
FCL-Introduction.pptx
FCL-Introduction.pptxFCL-Introduction.pptx
FCL-Introduction.pptxaratibhavsar
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering OWASP Foundation
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselCasey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counselbugcrowd
 
Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2MLG College of Learning, Inc
 
Keeping an Eye On Risk - Current Concerns and Supervisory Oversight
Keeping an Eye On Risk - Current Concerns and Supervisory OversightKeeping an Eye On Risk - Current Concerns and Supervisory Oversight
Keeping an Eye On Risk - Current Concerns and Supervisory OversightCBIZ, Inc.
 

Similar to 02 presentation-christianprobst (20)

- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering Basics
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
 
Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Information security
Information securityInformation security
Information security
 
nerfslides.pptx
nerfslides.pptxnerfslides.pptx
nerfslides.pptx
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
QuestionConsider the Citibank incident in 2005 where more than 3.9.pdf
QuestionConsider the Citibank incident in 2005 where more than 3.9.pdfQuestionConsider the Citibank incident in 2005 where more than 3.9.pdf
QuestionConsider the Citibank incident in 2005 where more than 3.9.pdf
 
FCL-Introduction.pptx
FCL-Introduction.pptxFCL-Introduction.pptx
FCL-Introduction.pptx
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015
 
Keeping an Eye On Risk - Current Concerns and Supervisory Oversight
Keeping an Eye On Risk - Current Concerns and Supervisory OversightKeeping an Eye On Risk - Current Concerns and Supervisory Oversight
Keeping an Eye On Risk - Current Concerns and Supervisory Oversight
 

More from InfinIT - Innovationsnetværket for it

More from InfinIT - Innovationsnetværket for it (20)

Erfaringer med-c kurt-noermark
Erfaringer med-c kurt-noermarkErfaringer med-c kurt-noermark
Erfaringer med-c kurt-noermark
 
Object orientering, test driven development og c
Object orientering, test driven development og cObject orientering, test driven development og c
Object orientering, test driven development og c
 
Embedded softwaredevelopment hcs
Embedded softwaredevelopment hcsEmbedded softwaredevelopment hcs
Embedded softwaredevelopment hcs
 
C og c++-jens lund jensen
C og c++-jens lund jensenC og c++-jens lund jensen
C og c++-jens lund jensen
 
201811xx foredrag c_cpp
201811xx foredrag c_cpp201811xx foredrag c_cpp
201811xx foredrag c_cpp
 
C som-programmeringssprog-bt
C som-programmeringssprog-btC som-programmeringssprog-bt
C som-programmeringssprog-bt
 
Infinit seminar 060918
Infinit seminar 060918Infinit seminar 060918
Infinit seminar 060918
 
DCR solutions
DCR solutionsDCR solutions
DCR solutions
 
Not your grandfathers BPM
Not your grandfathers BPMNot your grandfathers BPM
Not your grandfathers BPM
 
Kmd workzone - an evolutionary approach to revolution
Kmd workzone - an evolutionary approach to revolutionKmd workzone - an evolutionary approach to revolution
Kmd workzone - an evolutionary approach to revolution
 
EcoKnow - oplæg
EcoKnow - oplægEcoKnow - oplæg
EcoKnow - oplæg
 
Martin Wickins Chatbots i fronten
Martin Wickins Chatbots i frontenMartin Wickins Chatbots i fronten
Martin Wickins Chatbots i fronten
 
Marie Fenger ai kundeservice
Marie Fenger ai kundeserviceMarie Fenger ai kundeservice
Marie Fenger ai kundeservice
 
Mads Kaysen SupWiz
Mads Kaysen SupWizMads Kaysen SupWiz
Mads Kaysen SupWiz
 
Leif Howalt NNIT Service Support Center
Leif Howalt NNIT Service Support CenterLeif Howalt NNIT Service Support Center
Leif Howalt NNIT Service Support Center
 
Jan Neerbek NLP og Chatbots
Jan Neerbek NLP og ChatbotsJan Neerbek NLP og Chatbots
Jan Neerbek NLP og Chatbots
 
Anders Soegaard NLP for Customer Support
Anders Soegaard NLP for Customer SupportAnders Soegaard NLP for Customer Support
Anders Soegaard NLP for Customer Support
 
Stephen Alstrup infinit august 2018
Stephen Alstrup infinit august 2018Stephen Alstrup infinit august 2018
Stephen Alstrup infinit august 2018
 
Innovation og værdiskabelse i it-projekter
Innovation og værdiskabelse i it-projekterInnovation og værdiskabelse i it-projekter
Innovation og værdiskabelse i it-projekter
 
Rokoko infin it presentation
Rokoko infin it presentation Rokoko infin it presentation
Rokoko infin it presentation
 

Recently uploaded

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Recently uploaded (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 

02 presentation-christianprobst

  • 1. Social engineering, Insiders, and Security Christian W Probst Technical University of Denmark infinIT seminar om insidertrusler NetIQ, 2015/03/12
  • 2. 2 What is the Problem? •  We depend increasingly upon complex information systems •  Focus on the vulnerability to –  Computer crime –  Security attacks [RAND Report, 2004] “The insider threat is perhaps the greatest threat to [society, information system, ...]”
  • 3. 3 Securing Against the Inside •  Protect against attacks from an insider •  Insider has – Better knowledge/information – Better access •  Hard or impossible to distinguish from admissible actions •  Little research on analysing socio-technical systems
  • 4. 4 What is an Insider? •  An insider is an entity that has been legitimately empowered with the right to access, represent, or decide about one or more assets of the organization’s structure. •  A program can also be an insider •  It is sufficient to have access to an asset containing the asset in question
  • 5. 5 Example 1: The Hard Disk Example Naive user and absent policy In 2003, Banner Therapy employee Christina Binney, a co- founder of the company, was discharged from her position for “misconduct”, and instructed not to return to the office. BT claimed she impermissibly removed a hard drive from her work computer and took it home over the weekend to prepare for a client meeting.
  • 6. 6 Example 1: The Hard Disk Example (ctd) Naive user and absent policy BT claimed that the removal crippled Banners operations and placed vital data at risk. Binney explained that a customer requested a meeting on a Friday for the following Monday morning. To prepare, she chose to remove the entire hard drive from her work computer, rather than to transfer the files to a disk. At the time, BT had neither company policy about taking work equipment home nor established computing protocols. When Binney attempted to return to work on Monday, she was denied access; this prevented her from returning the drive as she claimed she had planned.
  • 7. 7 Example 2: The Trade Secret Example Malicious user steals trade secrets In 2007, FBI agents arrested two engineers, who had worked for NetLogic Microsystems (NLM) until 2003. The two men used money from mainland China to create and incorporate a company for the sole purpose of exploiting the secrets they stole. They downloaded sensitive NLM documents onto their home computers, top-level confidential technical descriptions in enough specificity to enable someone to produce the technology. Together, the men accumulated the information needed to design and produce their own lines of microprocessors and microchips.
  • 8. 8 Example 2: The Trade Secret Example (ctd) Malicious user steals trade secrets To finance the business, the men contacted Beijing FBNI Electronic Technology Development Company Ltd, and entered into an agreement to develop and sell microprocessor chips. Both men were able to access proprietary information without exceeding their individual authorizations. Investigators uncovered evidence that the venture capitalist had ties to the Chinese government and military.
  • 9. 9 Example 3: The Tax Fraud Example Perimeter definition and system design H. Walters and others are accused for perpetrating the biggest fraud in Washingtons history. Until her arrest, “Walters was a 26-year tax employee known as a problem solver with a knack for finding solutions by using the departments antiquated and balky computers or finding a way around them.” She allegedly used her position to produce fake checks for bogus refunds with fictitious names; the total is said to exceed $50 million.
  • 10. 10 Example 3: The Tax Fraud Example (ctd) Perimeter definition and system design The scheme involved Washingtons new Integrated Tax System. During design phase, Walters “contributed to the decision that her unit, which handled real estate tax refunds, be left out of it.” At the time, the decision seemed to make sense for cost reasons. The scheme exploited several loopholes: each check was under the threshold for requiring a supervisor’s approval, and no action was taken to cancel the first check or confirm that it had not already been cashed.
  • 11. 11 Example 4: The Cloud Provider Sysadmin Perimeter definition A system administrator in the facilities of a cloud provider allegedly used a package sniffer to record the image of a migrating virtual machine of a financial institution. The virtual machine was migrated from one server to another, possibly triggered by some action of the system administrator, allowing him to capture the network traffic. Once home, he replayed the network traffic, and reinstantiated the virtual machine, giving him access to all the data of the VM.
  • 12. 12 Elements of Insider Threats •  An owner of an asset •  An inside entity that can access the asset •  The possibility that the insider might do something with which the owner does not allowed it to do – This might be the access to the asset, or some action using the asset
  • 13. 13 Possible Insider Threats •  Accidental Insider –  Ooops... I REALLY did not want that •  Malicious insider –  Motivation is to harm the organisation –  Or personal gain •  Unaware insider –  Could you just do this... –  Social engineered to do something
  • 14. 14 Accidental Insider •  Hard to control •  But potentially catastrophic consequences –  Leaving door unlocked –  Sending confidential files –  ...
  • 15. 15 Malicious Insider •  The "typical" insider •  Disgruntled employee •  Motivation, opportunity, abilities •  Often developing over time •  Motivation –  Harm the organisation, revenge –  Monetary gain –  Make a point
  • 16. 16 Unaware Insider •  Is "convinced" by an attacker to perform an action •  Usually social engineering •  Believes to do "the right thing" or a favor •  Severe consequences •  Can be anything from opening a door, providing access, installing something
  • 17. 17 Can't we just detect them?
  • 18. 18 Detecting Inside attacker is "easy" •  Need a concise model of human behaviour •  Dependencies on the surroundings, •  A sufficiently precise surveillance system, and •  An evaluation system, that can draw the necessary conclusions from its input. •  Neither “easy” to realise, or in any form desirable. •  Lack techniques to model human behaviour. •  Surveillance systems depend on legal boundaries.
  • 19. 19 Containing Insider Threats •  Three major components –  Identification of potential insider attackers –  Monitoring of operations –  Training of employees
  • 20. 20 Identify Factors •  Important areas are legal frameworks, policies, and human behaviour •  Goal: provide classifications of events and observations •  Analyse policies to determine short-comings, contradictions, inconsistencies, and loopholes –  These are often exploited to realise insider attacks.
  • 21. 21 Monitoring •  analyses the events in an organisation for signs of insider threats •  Should be adapted to the expected level of threat and the value of assets •  Challenge 1: ensure that the right data is collected, and that the data can be analysed •  Challenge 2: differentiate legal actions by legal users, illegal actions by legal users, and illegal actions by illegal users. –  How to deal with false positives/negatives?
  • 22. 22 Training •  Important component in containing insider threats. •  Main goal: rising awareness for insider threats. •  Subgoals: –  Streamline policies, detect distortions, or sharpen alertness •  Tap into employees' knowledge about faulty policies and workflows, insider threats, and counter measures
  • 23. 23 Social Engineering •  Mix of science, psychology, and art. •  Skillfully maneuver somebody to take action or not in some aspect of their life. •  Dress up as courier with heavy box, ask to open door; •  Telephone technician; •  Clorius technician; •  Santa Claus; •  Call employee, pretend to be from IT service; or many other.
  • 24. 24 Social Engineering •  Works by building up a pretext. •  Goal: –  Make it likely that attack succeeds, and –  Give the victim a good reason to excuse their actions to themselves. •  Heavy box; •  Construct scenario of urgency based on cover story; or •  Give reason to believe that you belong into the picture.
  • 25. 25 How to defend against Social Engineering •  Perform physical security / social engineering tests. •  Teach your employees social engineering. –  The more they know, the easier they can identify them. •  Create a security awareness "program" –  Enforce regular training activities. –  Re-enact "typical" scenarios. •  Make employees aware of –  The value of assets, and –  The consequences of actions.
  • 26. 26 Contact Christian W Probst DTU Compute Richard Petersens Plads 324 2800 Kgs. Lyngby Email cwpr@dtu.dk Mobil +45 26 57 32 96