SlideShare a Scribd company logo
Social engineering, Insiders,
and Security
Christian W Probst
Technical University of Denmark
infinIT seminar om insidertrusler
NetIQ, 2015/03/12
2
What is the Problem?
•  We depend increasingly upon complex information
systems
•  Focus on the vulnerability to
–  Computer crime
–  Security attacks [RAND Report, 2004]
“The insider threat is
perhaps the greatest threat
to [society, information
system, ...]”
3
Securing Against the Inside
•  Protect against attacks from an insider
•  Insider has
– Better knowledge/information
– Better access
•  Hard or impossible to distinguish from admissible
actions
•  Little research on analysing socio-technical systems
4
What is an Insider?
•  An insider is an entity that has been legitimately
empowered with the right to access, represent, or
decide about one or more assets of the
organization’s structure.
•  A program can also be an insider
•  It is sufficient to have access to an asset containing
the asset in question
5
Example 1: The Hard Disk Example
Naive user and absent policy
In 2003, Banner Therapy employee Christina Binney, a co-
founder of the company, was discharged from her position for
“misconduct”, and instructed not to return to the office. BT
claimed she impermissibly removed a hard drive from her work
computer and took it home over the weekend to prepare for a
client meeting.
6
Example 1: The Hard Disk Example (ctd)
Naive user and absent policy
BT claimed that the removal crippled Banners operations and
placed vital data at risk. Binney explained that a customer
requested a meeting on a Friday for the following Monday
morning. To prepare, she chose to remove the entire hard drive
from her work computer, rather than to transfer the files to a
disk. At the time, BT had neither company policy about taking
work equipment home nor established computing protocols.
When Binney attempted to return to work on Monday, she was
denied access; this prevented her from returning the drive as
she claimed she had planned.
7
Example 2: The Trade Secret Example
Malicious user steals trade secrets
In 2007, FBI agents arrested two engineers, who had worked for
NetLogic Microsystems (NLM) until 2003. The two men used
money from mainland China to create and incorporate a
company for the sole purpose of exploiting the secrets they
stole. They downloaded sensitive NLM documents onto their
home computers, top-level confidential technical descriptions
in enough specificity to enable someone to produce the
technology. Together, the men accumulated the information
needed to design and produce their own lines of
microprocessors and microchips.
8
Example 2: The Trade Secret Example (ctd)
Malicious user steals trade secrets
To finance the business, the men contacted Beijing FBNI
Electronic Technology Development Company Ltd, and entered
into an agreement to develop and sell microprocessor chips.
Both men were able to access proprietary information without
exceeding their individual authorizations. Investigators
uncovered evidence that the venture capitalist had ties to the
Chinese government and military.
9
Example 3: The Tax Fraud Example
Perimeter definition and system design
H. Walters and others are accused for perpetrating the biggest
fraud in Washingtons history. Until her arrest, “Walters was a
26-year tax employee known as a problem solver with a knack
for finding solutions by using the departments antiquated and
balky computers or finding a way around them.” She allegedly
used her position to produce fake checks for bogus refunds
with fictitious names; the total is said to exceed $50 million.
10
Example 3: The Tax Fraud Example (ctd)
Perimeter definition and system design
The scheme involved Washingtons new Integrated Tax System.
During design phase, Walters “contributed to the decision that
her unit, which handled real estate tax refunds, be left out of it.”
At the time, the decision seemed to make sense for cost
reasons.
The scheme exploited several loopholes: each check was under
the threshold for requiring a supervisor’s approval, and no
action was taken to cancel the first check or confirm that it had
not already been cashed.
11
Example 4: The Cloud Provider Sysadmin
Perimeter definition
A system administrator in the facilities of a cloud provider
allegedly used a package sniffer to record the image of a
migrating virtual machine of a financial institution.
The virtual machine was migrated from one server to another,
possibly triggered by some action of the system administrator,
allowing him to capture the network traffic.
Once home, he replayed the network traffic, and reinstantiated
the virtual machine, giving him access to all the data of the VM.
12
Elements of Insider Threats
•  An owner of an asset
•  An inside entity that can access the asset
•  The possibility that the insider might do something
with which the owner does not allowed it to do
– This might be the access to the asset, or some
action using the asset
13
Possible Insider Threats
•  Accidental Insider
–  Ooops... I REALLY did not want that
•  Malicious insider
–  Motivation is to harm the organisation
–  Or personal gain
•  Unaware insider
–  Could you just do this...
–  Social engineered to do something
14
Accidental Insider
•  Hard to control
•  But potentially catastrophic consequences
–  Leaving door unlocked
–  Sending confidential files
–  ...
15
Malicious Insider
•  The "typical" insider
•  Disgruntled employee
•  Motivation, opportunity, abilities
•  Often developing over time
•  Motivation
–  Harm the organisation, revenge
–  Monetary gain
–  Make a point
16
Unaware Insider
•  Is "convinced" by an attacker to perform an action
•  Usually social engineering
•  Believes to do "the right thing" or a favor
•  Severe consequences
•  Can be anything from opening a door, providing access,
installing something
17
Can't we just detect them?
18
Detecting Inside attacker is "easy"
•  Need a concise model of human behaviour
•  Dependencies on the surroundings,
•  A sufficiently precise surveillance system, and
•  An evaluation system, that can draw the necessary
conclusions from its input.
•  Neither “easy” to realise, or in any form desirable.
•  Lack techniques to model human behaviour.
•  Surveillance systems depend on legal boundaries.
19
Containing Insider Threats
•  Three major components
–  Identification of potential insider attackers
–  Monitoring of operations
–  Training of employees
20
Identify Factors
•  Important areas are legal frameworks, policies, and human
behaviour
•  Goal: provide classifications of events and observations
•  Analyse policies to determine short-comings, contradictions,
inconsistencies, and loopholes
–  These are often exploited to realise insider attacks.
21
Monitoring
•  analyses the events in an organisation for signs of insider
threats
•  Should be adapted to the expected level of threat and the
value of assets
•  Challenge 1: ensure that the right data is collected, and that
the data can be analysed
•  Challenge 2: differentiate legal actions by legal users, illegal
actions by legal users, and illegal actions by illegal users.
–  How to deal with false positives/negatives?
22
Training
•  Important component in containing insider threats.
•  Main goal: rising awareness for insider threats.
•  Subgoals:
–  Streamline policies, detect distortions, or sharpen alertness
•  Tap into employees' knowledge about faulty policies and
workflows, insider threats, and counter measures
23
Social Engineering
•  Mix of science, psychology, and art.
•  Skillfully maneuver somebody to take action or not in some
aspect of their life.
•  Dress up as courier with heavy box, ask to open door;
•  Telephone technician;
•  Clorius technician;
•  Santa Claus;
•  Call employee, pretend to be from IT service; or many other.
24
Social Engineering
•  Works by building up a pretext.
•  Goal:
–  Make it likely that attack succeeds, and
–  Give the victim a good reason to excuse their actions to
themselves.
•  Heavy box;
•  Construct scenario of urgency based on cover story; or
•  Give reason to believe that you belong into the picture.
25
How to defend against Social Engineering
•  Perform physical security / social engineering tests.
•  Teach your employees social engineering.
–  The more they know, the easier they can identify them.
•  Create a security awareness "program"
–  Enforce regular training activities.
–  Re-enact "typical" scenarios.
•  Make employees aware of
–  The value of assets, and
–  The consequences of actions.
26
Contact
Christian W Probst
DTU Compute
Richard Petersens Plads 324
2800 Kgs. Lyngby
Email cwpr@dtu.dk
Mobil +45 26 57 32 96

More Related Content

What's hot

Cloud Computing Legal for Pennsylvania Bar Association
Cloud Computing Legal for Pennsylvania Bar AssociationCloud Computing Legal for Pennsylvania Bar Association
Cloud Computing Legal for Pennsylvania Bar Association
Amy Larrimore
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
Varshil Patel
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
TechSoup Canada
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
Julius Clark, CISSP, CISA
 
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?
Dan Michaluk
 
Insider threat
Insider threatInsider threat
Insider threat
ARCON TECHSOLUTIONS
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
Jim Brashear
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
Casey Ellis
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMS
Scott Suhy
 
Insider threat v3
Insider threat v3Insider threat v3
Insider threat v3
Lancope, Inc.
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability Presentation
Sean Graham
 
The internet as a corporate security resource
The internet as a corporate security resourceThe internet as a corporate security resource
The internet as a corporate security resource
Dan Michaluk
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
Don Grauel
 
Cyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutionsCyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutions
Capri Insurance
 
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for NonprofitsWebinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
Withum
 
NumaanHuq_Hackfest2015
NumaanHuq_Hackfest2015NumaanHuq_Hackfest2015
NumaanHuq_Hackfest2015
Numaan Huq
 
Dean carey - data loss-prevention - atlseccon2011
Dean carey - data loss-prevention - atlseccon2011Dean carey - data loss-prevention - atlseccon2011
Dean carey - data loss-prevention - atlseccon2011
Atlantic Security Conference
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
Somya Johri
 
Dealing with the insider threat.
Dealing with the insider threat.Dealing with the insider threat.
Dealing with the insider threat.
Matt Lemon
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets Personal
Nicholas Davis
 

What's hot (20)

Cloud Computing Legal for Pennsylvania Bar Association
Cloud Computing Legal for Pennsylvania Bar AssociationCloud Computing Legal for Pennsylvania Bar Association
Cloud Computing Legal for Pennsylvania Bar Association
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?
 
Insider threat
Insider threatInsider threat
Insider threat
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMS
 
Insider threat v3
Insider threat v3Insider threat v3
Insider threat v3
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability Presentation
 
The internet as a corporate security resource
The internet as a corporate security resourceThe internet as a corporate security resource
The internet as a corporate security resource
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Cyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutionsCyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutions
 
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for NonprofitsWebinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
 
NumaanHuq_Hackfest2015
NumaanHuq_Hackfest2015NumaanHuq_Hackfest2015
NumaanHuq_Hackfest2015
 
Dean carey - data loss-prevention - atlseccon2011
Dean carey - data loss-prevention - atlseccon2011Dean carey - data loss-prevention - atlseccon2011
Dean carey - data loss-prevention - atlseccon2011
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Dealing with the insider threat.
Dealing with the insider threat.Dealing with the insider threat.
Dealing with the insider threat.
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets Personal
 

Similar to 02 presentation-christianprobst

- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf
Ramya Nellutla
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
Marin Ivezic
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering Basics
Luke Rusten
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
CBIZ, Inc.
 
Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"
abercius24
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Chris Hails
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
Russell Publishing
 
Information security
Information securityInformation security
Information security
Vijayananda Mohire
 
nerfslides.pptx
nerfslides.pptxnerfslides.pptx
nerfslides.pptx
ssusera5ade5
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
Krist Davood - Principal - CIO
 
security_threats.pdf and control mechanisms
security_threats.pdf and control mechanismssecurity_threats.pdf and control mechanisms
security_threats.pdf and control mechanisms
ronoelias98
 
QuestionConsider the Citibank incident in 2005 where more than 3.9.pdf
QuestionConsider the Citibank incident in 2005 where more than 3.9.pdfQuestionConsider the Citibank incident in 2005 where more than 3.9.pdf
QuestionConsider the Citibank incident in 2005 where more than 3.9.pdf
infomalad
 
FCL-Introduction.pptx
FCL-Introduction.pptxFCL-Introduction.pptx
FCL-Introduction.pptx
aratibhavsar
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
Ian-Edward Stafrace
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
OWASP Foundation
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Casey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
bugcrowd
 
Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2
MLG College of Learning, Inc
 
Lesson 2
Lesson 2Lesson 2
Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015
Hovhannes Aghajanyan
 

Similar to 02 presentation-christianprobst (20)

- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering Basics
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
 
Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Information security
Information securityInformation security
Information security
 
nerfslides.pptx
nerfslides.pptxnerfslides.pptx
nerfslides.pptx
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
security_threats.pdf and control mechanisms
security_threats.pdf and control mechanismssecurity_threats.pdf and control mechanisms
security_threats.pdf and control mechanisms
 
QuestionConsider the Citibank incident in 2005 where more than 3.9.pdf
QuestionConsider the Citibank incident in 2005 where more than 3.9.pdfQuestionConsider the Citibank incident in 2005 where more than 3.9.pdf
QuestionConsider the Citibank incident in 2005 where more than 3.9.pdf
 
FCL-Introduction.pptx
FCL-Introduction.pptxFCL-Introduction.pptx
FCL-Introduction.pptx
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015
 

More from InfinIT - Innovationsnetværket for it

Erfaringer med-c kurt-noermark
Erfaringer med-c kurt-noermarkErfaringer med-c kurt-noermark
Erfaringer med-c kurt-noermark
InfinIT - Innovationsnetværket for it
 
Object orientering, test driven development og c
Object orientering, test driven development og cObject orientering, test driven development og c
Object orientering, test driven development og c
InfinIT - Innovationsnetværket for it
 
Embedded softwaredevelopment hcs
Embedded softwaredevelopment hcsEmbedded softwaredevelopment hcs
Embedded softwaredevelopment hcs
InfinIT - Innovationsnetværket for it
 
C og c++-jens lund jensen
C og c++-jens lund jensenC og c++-jens lund jensen
C og c++-jens lund jensen
InfinIT - Innovationsnetværket for it
 
201811xx foredrag c_cpp
201811xx foredrag c_cpp201811xx foredrag c_cpp
C som-programmeringssprog-bt
C som-programmeringssprog-btC som-programmeringssprog-bt
C som-programmeringssprog-bt
InfinIT - Innovationsnetværket for it
 
Infinit seminar 060918
Infinit seminar 060918Infinit seminar 060918
DCR solutions
DCR solutionsDCR solutions
Not your grandfathers BPM
Not your grandfathers BPMNot your grandfathers BPM
Not your grandfathers BPM
InfinIT - Innovationsnetværket for it
 
Kmd workzone - an evolutionary approach to revolution
Kmd workzone - an evolutionary approach to revolutionKmd workzone - an evolutionary approach to revolution
Kmd workzone - an evolutionary approach to revolution
InfinIT - Innovationsnetværket for it
 
EcoKnow - oplæg
EcoKnow - oplægEcoKnow - oplæg
Martin Wickins Chatbots i fronten
Martin Wickins Chatbots i frontenMartin Wickins Chatbots i fronten
Martin Wickins Chatbots i fronten
InfinIT - Innovationsnetværket for it
 
Marie Fenger ai kundeservice
Marie Fenger ai kundeserviceMarie Fenger ai kundeservice
Marie Fenger ai kundeservice
InfinIT - Innovationsnetværket for it
 
Mads Kaysen SupWiz
Mads Kaysen SupWizMads Kaysen SupWiz
Leif Howalt NNIT Service Support Center
Leif Howalt NNIT Service Support CenterLeif Howalt NNIT Service Support Center
Leif Howalt NNIT Service Support Center
InfinIT - Innovationsnetværket for it
 
Jan Neerbek NLP og Chatbots
Jan Neerbek NLP og ChatbotsJan Neerbek NLP og Chatbots
Jan Neerbek NLP og Chatbots
InfinIT - Innovationsnetværket for it
 
Anders Soegaard NLP for Customer Support
Anders Soegaard NLP for Customer SupportAnders Soegaard NLP for Customer Support
Anders Soegaard NLP for Customer Support
InfinIT - Innovationsnetværket for it
 
Stephen Alstrup infinit august 2018
Stephen Alstrup infinit august 2018Stephen Alstrup infinit august 2018
Stephen Alstrup infinit august 2018
InfinIT - Innovationsnetværket for it
 
Innovation og værdiskabelse i it-projekter
Innovation og værdiskabelse i it-projekterInnovation og værdiskabelse i it-projekter
Innovation og værdiskabelse i it-projekter
InfinIT - Innovationsnetværket for it
 
Rokoko infin it presentation
Rokoko infin it presentation Rokoko infin it presentation
Rokoko infin it presentation
InfinIT - Innovationsnetværket for it
 

More from InfinIT - Innovationsnetværket for it (20)

Erfaringer med-c kurt-noermark
Erfaringer med-c kurt-noermarkErfaringer med-c kurt-noermark
Erfaringer med-c kurt-noermark
 
Object orientering, test driven development og c
Object orientering, test driven development og cObject orientering, test driven development og c
Object orientering, test driven development og c
 
Embedded softwaredevelopment hcs
Embedded softwaredevelopment hcsEmbedded softwaredevelopment hcs
Embedded softwaredevelopment hcs
 
C og c++-jens lund jensen
C og c++-jens lund jensenC og c++-jens lund jensen
C og c++-jens lund jensen
 
201811xx foredrag c_cpp
201811xx foredrag c_cpp201811xx foredrag c_cpp
201811xx foredrag c_cpp
 
C som-programmeringssprog-bt
C som-programmeringssprog-btC som-programmeringssprog-bt
C som-programmeringssprog-bt
 
Infinit seminar 060918
Infinit seminar 060918Infinit seminar 060918
Infinit seminar 060918
 
DCR solutions
DCR solutionsDCR solutions
DCR solutions
 
Not your grandfathers BPM
Not your grandfathers BPMNot your grandfathers BPM
Not your grandfathers BPM
 
Kmd workzone - an evolutionary approach to revolution
Kmd workzone - an evolutionary approach to revolutionKmd workzone - an evolutionary approach to revolution
Kmd workzone - an evolutionary approach to revolution
 
EcoKnow - oplæg
EcoKnow - oplægEcoKnow - oplæg
EcoKnow - oplæg
 
Martin Wickins Chatbots i fronten
Martin Wickins Chatbots i frontenMartin Wickins Chatbots i fronten
Martin Wickins Chatbots i fronten
 
Marie Fenger ai kundeservice
Marie Fenger ai kundeserviceMarie Fenger ai kundeservice
Marie Fenger ai kundeservice
 
Mads Kaysen SupWiz
Mads Kaysen SupWizMads Kaysen SupWiz
Mads Kaysen SupWiz
 
Leif Howalt NNIT Service Support Center
Leif Howalt NNIT Service Support CenterLeif Howalt NNIT Service Support Center
Leif Howalt NNIT Service Support Center
 
Jan Neerbek NLP og Chatbots
Jan Neerbek NLP og ChatbotsJan Neerbek NLP og Chatbots
Jan Neerbek NLP og Chatbots
 
Anders Soegaard NLP for Customer Support
Anders Soegaard NLP for Customer SupportAnders Soegaard NLP for Customer Support
Anders Soegaard NLP for Customer Support
 
Stephen Alstrup infinit august 2018
Stephen Alstrup infinit august 2018Stephen Alstrup infinit august 2018
Stephen Alstrup infinit august 2018
 
Innovation og værdiskabelse i it-projekter
Innovation og værdiskabelse i it-projekterInnovation og værdiskabelse i it-projekter
Innovation og værdiskabelse i it-projekter
 
Rokoko infin it presentation
Rokoko infin it presentation Rokoko infin it presentation
Rokoko infin it presentation
 

Recently uploaded

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 

02 presentation-christianprobst

  • 1. Social engineering, Insiders, and Security Christian W Probst Technical University of Denmark infinIT seminar om insidertrusler NetIQ, 2015/03/12
  • 2. 2 What is the Problem? •  We depend increasingly upon complex information systems •  Focus on the vulnerability to –  Computer crime –  Security attacks [RAND Report, 2004] “The insider threat is perhaps the greatest threat to [society, information system, ...]”
  • 3. 3 Securing Against the Inside •  Protect against attacks from an insider •  Insider has – Better knowledge/information – Better access •  Hard or impossible to distinguish from admissible actions •  Little research on analysing socio-technical systems
  • 4. 4 What is an Insider? •  An insider is an entity that has been legitimately empowered with the right to access, represent, or decide about one or more assets of the organization’s structure. •  A program can also be an insider •  It is sufficient to have access to an asset containing the asset in question
  • 5. 5 Example 1: The Hard Disk Example Naive user and absent policy In 2003, Banner Therapy employee Christina Binney, a co- founder of the company, was discharged from her position for “misconduct”, and instructed not to return to the office. BT claimed she impermissibly removed a hard drive from her work computer and took it home over the weekend to prepare for a client meeting.
  • 6. 6 Example 1: The Hard Disk Example (ctd) Naive user and absent policy BT claimed that the removal crippled Banners operations and placed vital data at risk. Binney explained that a customer requested a meeting on a Friday for the following Monday morning. To prepare, she chose to remove the entire hard drive from her work computer, rather than to transfer the files to a disk. At the time, BT had neither company policy about taking work equipment home nor established computing protocols. When Binney attempted to return to work on Monday, she was denied access; this prevented her from returning the drive as she claimed she had planned.
  • 7. 7 Example 2: The Trade Secret Example Malicious user steals trade secrets In 2007, FBI agents arrested two engineers, who had worked for NetLogic Microsystems (NLM) until 2003. The two men used money from mainland China to create and incorporate a company for the sole purpose of exploiting the secrets they stole. They downloaded sensitive NLM documents onto their home computers, top-level confidential technical descriptions in enough specificity to enable someone to produce the technology. Together, the men accumulated the information needed to design and produce their own lines of microprocessors and microchips.
  • 8. 8 Example 2: The Trade Secret Example (ctd) Malicious user steals trade secrets To finance the business, the men contacted Beijing FBNI Electronic Technology Development Company Ltd, and entered into an agreement to develop and sell microprocessor chips. Both men were able to access proprietary information without exceeding their individual authorizations. Investigators uncovered evidence that the venture capitalist had ties to the Chinese government and military.
  • 9. 9 Example 3: The Tax Fraud Example Perimeter definition and system design H. Walters and others are accused for perpetrating the biggest fraud in Washingtons history. Until her arrest, “Walters was a 26-year tax employee known as a problem solver with a knack for finding solutions by using the departments antiquated and balky computers or finding a way around them.” She allegedly used her position to produce fake checks for bogus refunds with fictitious names; the total is said to exceed $50 million.
  • 10. 10 Example 3: The Tax Fraud Example (ctd) Perimeter definition and system design The scheme involved Washingtons new Integrated Tax System. During design phase, Walters “contributed to the decision that her unit, which handled real estate tax refunds, be left out of it.” At the time, the decision seemed to make sense for cost reasons. The scheme exploited several loopholes: each check was under the threshold for requiring a supervisor’s approval, and no action was taken to cancel the first check or confirm that it had not already been cashed.
  • 11. 11 Example 4: The Cloud Provider Sysadmin Perimeter definition A system administrator in the facilities of a cloud provider allegedly used a package sniffer to record the image of a migrating virtual machine of a financial institution. The virtual machine was migrated from one server to another, possibly triggered by some action of the system administrator, allowing him to capture the network traffic. Once home, he replayed the network traffic, and reinstantiated the virtual machine, giving him access to all the data of the VM.
  • 12. 12 Elements of Insider Threats •  An owner of an asset •  An inside entity that can access the asset •  The possibility that the insider might do something with which the owner does not allowed it to do – This might be the access to the asset, or some action using the asset
  • 13. 13 Possible Insider Threats •  Accidental Insider –  Ooops... I REALLY did not want that •  Malicious insider –  Motivation is to harm the organisation –  Or personal gain •  Unaware insider –  Could you just do this... –  Social engineered to do something
  • 14. 14 Accidental Insider •  Hard to control •  But potentially catastrophic consequences –  Leaving door unlocked –  Sending confidential files –  ...
  • 15. 15 Malicious Insider •  The "typical" insider •  Disgruntled employee •  Motivation, opportunity, abilities •  Often developing over time •  Motivation –  Harm the organisation, revenge –  Monetary gain –  Make a point
  • 16. 16 Unaware Insider •  Is "convinced" by an attacker to perform an action •  Usually social engineering •  Believes to do "the right thing" or a favor •  Severe consequences •  Can be anything from opening a door, providing access, installing something
  • 17. 17 Can't we just detect them?
  • 18. 18 Detecting Inside attacker is "easy" •  Need a concise model of human behaviour •  Dependencies on the surroundings, •  A sufficiently precise surveillance system, and •  An evaluation system, that can draw the necessary conclusions from its input. •  Neither “easy” to realise, or in any form desirable. •  Lack techniques to model human behaviour. •  Surveillance systems depend on legal boundaries.
  • 19. 19 Containing Insider Threats •  Three major components –  Identification of potential insider attackers –  Monitoring of operations –  Training of employees
  • 20. 20 Identify Factors •  Important areas are legal frameworks, policies, and human behaviour •  Goal: provide classifications of events and observations •  Analyse policies to determine short-comings, contradictions, inconsistencies, and loopholes –  These are often exploited to realise insider attacks.
  • 21. 21 Monitoring •  analyses the events in an organisation for signs of insider threats •  Should be adapted to the expected level of threat and the value of assets •  Challenge 1: ensure that the right data is collected, and that the data can be analysed •  Challenge 2: differentiate legal actions by legal users, illegal actions by legal users, and illegal actions by illegal users. –  How to deal with false positives/negatives?
  • 22. 22 Training •  Important component in containing insider threats. •  Main goal: rising awareness for insider threats. •  Subgoals: –  Streamline policies, detect distortions, or sharpen alertness •  Tap into employees' knowledge about faulty policies and workflows, insider threats, and counter measures
  • 23. 23 Social Engineering •  Mix of science, psychology, and art. •  Skillfully maneuver somebody to take action or not in some aspect of their life. •  Dress up as courier with heavy box, ask to open door; •  Telephone technician; •  Clorius technician; •  Santa Claus; •  Call employee, pretend to be from IT service; or many other.
  • 24. 24 Social Engineering •  Works by building up a pretext. •  Goal: –  Make it likely that attack succeeds, and –  Give the victim a good reason to excuse their actions to themselves. •  Heavy box; •  Construct scenario of urgency based on cover story; or •  Give reason to believe that you belong into the picture.
  • 25. 25 How to defend against Social Engineering •  Perform physical security / social engineering tests. •  Teach your employees social engineering. –  The more they know, the easier they can identify them. •  Create a security awareness "program" –  Enforce regular training activities. –  Re-enact "typical" scenarios. •  Make employees aware of –  The value of assets, and –  The consequences of actions.
  • 26. 26 Contact Christian W Probst DTU Compute Richard Petersens Plads 324 2800 Kgs. Lyngby Email cwpr@dtu.dk Mobil +45 26 57 32 96