Insider Threats and
Countermeasures
BY: KAMRAN KHALID
Overview
What is Insider Threats?
Mistakes of Employee which creates threat
Three Kinds of Insider Threats
Source of Visibility
Internal Visibility
IT Sabotage
Combating Insider Threat is a multidisciplinary challenge
Conclusion
What is Insider Threats?
An insider threat is a malicious threat to an organization that comes from
following people within the organization
◦ Employees
◦ Former employees
◦ Contractors
◦ Business associates
◦ The person who have inside information concerning the organization's
security practices, data and computer systems.
Mistakes of Employee which creates
threat
PASSWORD HANDLING
• Shoulder Surfing:- When a person looks over another person’s shoulder
and watches keystrokes or watches data as it appears on the screen in
order to uncover information in an unauthorized manner.
• Dumpster Diving:- When password is very hard to remember so user
write it down, some times he write on a piece of paper which will be in
garbage without discarding. The intruder would have to gain physical
access to the premises, but the area where the garbage is kept is usually
not highly guarded.
Three Kinds of Insider Threats
Negligent Insiders
• Employees who
accidentally expose
data.
Malicious Insiders
• Employees who
intentionally
expose data.
Compromised
Insiders
• Employees whose
access credentials
or personal
computers have
been compromised
by an outside
attacker.
Three Kinds of Insider Threats
Negligent Insiders
• Prevention
• Access controls
• Encryption of data
at rest
• DRM?
• Education
Malicious Insiders
• Prevention
• Access Controls
• Checks and
Balances
• Detection
• Management
Training
• Monitoring
Compromised Insiders
• Detection
CERT: Common Sense Guide to Prevention and Detection of
Insider Threats
Source of Visibility
Firewall logs
• Are you logging
everything or
just denies?
Internal & Host
IPS systems
• HIPS potentially
has a lot of
breadth
• Can be
expensive to
deploy
• Signature based
Log Management
Solutions/SIEM
• Are you
collecting
everything?
• You can only see
what gets logged
Netflow
• Lots of breadth,
less depth
• Lower disk space
requirements
Full Packet
Capture
• Deep but not
broad
• Expensive
• High disk space
requirements
Internal Visibility
without Net flow
DMZ
VPN
Internal
Network
Internet
3G
Internet
3G
Internet
Internal Visibility
with Net flow
Internet
DMZ
VPN
Internal
Network
Internet
NetFlow Packets
start time
end time
mac address
byte count
- more -
NetFlow
3G
Internet
3G
Internet
NetFlow
NetFlow
NetFlow
NetFlow
NetFlow Collector
IT Sabotage
Targeted monitoring of employees who are “on the HR radar”
Access after termination (!) (accounts or open sessions)
Unusual Access
◦ Times
◦ Devices
◦ Source Addresses
◦ Destination Addresses
◦ Mismatches
Combating Insider Threat is a
multidisciplinary challenge
IT cannot address insider threat by itself
◦ People have a tendency to think that IT is solely responsible for all computer security issues.
Legal: Are policies in place? Are they realistic? Does legal support IT practices?
HR: Who is coming and going? Who has workplace issues? Are there soft solutions?
IT: Is the privacy of end users adequately protected?
What impact on workplace harmony are policies, monitoring,
and enforcement having?
Are you applying policies consistently?
IT
HR Legal
Conclusion
There are three kinds of insider threat
• Negligent Insiders
• Malicious Insiders
• Compromised Insiders
Managing the problem involves
• Logs, Logs, Logs
• Visibility into the internal network
• A multidisciplinary team
References
http://searchsecurity.techtarget.com/tip/Five-common-insider-threats-and-how-to-mitigate-
them
http://www.tripwire.com/state-of-security/incident-detection/identifying-and-preventing-
insider-threats/
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7118395
Thankyou

Insider threats and countermeasures

  • 1.
  • 2.
    Overview What is InsiderThreats? Mistakes of Employee which creates threat Three Kinds of Insider Threats Source of Visibility Internal Visibility IT Sabotage Combating Insider Threat is a multidisciplinary challenge Conclusion
  • 3.
    What is InsiderThreats? An insider threat is a malicious threat to an organization that comes from following people within the organization ◦ Employees ◦ Former employees ◦ Contractors ◦ Business associates ◦ The person who have inside information concerning the organization's security practices, data and computer systems.
  • 4.
    Mistakes of Employeewhich creates threat PASSWORD HANDLING • Shoulder Surfing:- When a person looks over another person’s shoulder and watches keystrokes or watches data as it appears on the screen in order to uncover information in an unauthorized manner. • Dumpster Diving:- When password is very hard to remember so user write it down, some times he write on a piece of paper which will be in garbage without discarding. The intruder would have to gain physical access to the premises, but the area where the garbage is kept is usually not highly guarded.
  • 5.
    Three Kinds ofInsider Threats Negligent Insiders • Employees who accidentally expose data. Malicious Insiders • Employees who intentionally expose data. Compromised Insiders • Employees whose access credentials or personal computers have been compromised by an outside attacker.
  • 6.
    Three Kinds ofInsider Threats Negligent Insiders • Prevention • Access controls • Encryption of data at rest • DRM? • Education Malicious Insiders • Prevention • Access Controls • Checks and Balances • Detection • Management Training • Monitoring Compromised Insiders • Detection
  • 7.
    CERT: Common SenseGuide to Prevention and Detection of Insider Threats
  • 8.
    Source of Visibility Firewalllogs • Are you logging everything or just denies? Internal & Host IPS systems • HIPS potentially has a lot of breadth • Can be expensive to deploy • Signature based Log Management Solutions/SIEM • Are you collecting everything? • You can only see what gets logged Netflow • Lots of breadth, less depth • Lower disk space requirements Full Packet Capture • Deep but not broad • Expensive • High disk space requirements
  • 9.
    Internal Visibility without Netflow DMZ VPN Internal Network Internet 3G Internet 3G Internet
  • 10.
    Internal Visibility with Netflow Internet DMZ VPN Internal Network Internet NetFlow Packets start time end time mac address byte count - more - NetFlow 3G Internet 3G Internet NetFlow NetFlow NetFlow NetFlow NetFlow Collector
  • 11.
    IT Sabotage Targeted monitoringof employees who are “on the HR radar” Access after termination (!) (accounts or open sessions) Unusual Access ◦ Times ◦ Devices ◦ Source Addresses ◦ Destination Addresses ◦ Mismatches
  • 12.
    Combating Insider Threatis a multidisciplinary challenge IT cannot address insider threat by itself ◦ People have a tendency to think that IT is solely responsible for all computer security issues. Legal: Are policies in place? Are they realistic? Does legal support IT practices? HR: Who is coming and going? Who has workplace issues? Are there soft solutions? IT: Is the privacy of end users adequately protected? What impact on workplace harmony are policies, monitoring, and enforcement having? Are you applying policies consistently? IT HR Legal
  • 13.
    Conclusion There are threekinds of insider threat • Negligent Insiders • Malicious Insiders • Compromised Insiders Managing the problem involves • Logs, Logs, Logs • Visibility into the internal network • A multidisciplinary team
  • 14.
  • 15.