SlideShare a Scribd company logo
The Insider versus External Threat
Zhi Hao Chen(30113181)
Pavan Geddam(30127867)
Sasidhar Bandla(30121080)
The Insider Threat
• What is insider threat?
An insider threat is generally defined as a current or former
employee, contractor, or other business partner who has or had
authorized access to an organization's network, system, or data and
intentionally misused that access to negatively affect the
confidentiality, integrity, or availability of the organization's
information or information systems. Insiders do not always act alone
and may not be aware they are aiding a threat actor (i.e. the
unintentional insider threat).
The Insider Threat
• Some characteristics of Insiders
at Risk of Becoming a Threat
1. Greed/ financial need
2. Reduced loyalty
3. Pattern of frustration and disappointment
4. Inability to assume responsibility for their actions
The Insider Threat
How to know who is insider
Acting differently
Download or copy more information from the company
than they should know
Working long hours than others
The Insider Threat
Decrease insider threat
• Training employees to recognize phishing and other
social media threat vectors
• Train continuously to maintain the proper levels of
knowledge skills and abilities
• Maintain staff values and attitudes that align with
organizational mission and ethics
• Improve usability of security tools
• Improve usability of software to reduce the likelihood
of system-induced human error
The Insider Threat
 Defend your organisation from insider crime by:
• Effective supervision – set the tone from the top
• An anti-fraud strategy, tailored to the needs of the particular
organisation
• Listening to staff concerns and encouraging them to speak up
• Looking for weaknesses in controls and systems
• Technical controls such as server room audit trails and disabled
USB access to prevent data theft
• Effective pre-employment screening
• Disabling access privileges on termination of employment
• Be honest – report fraud, prosecute if necessary and give truthful
references for employees
External Threat
•External threats are anything
from your organization's outside
environment that can adversely
affect its performance or
achievement of its goals.
Ironically, stronger organizations
can be exposed to a greater level
of threats than weaker
organizations because success
breeds envy and competition to
take what your organization has
achieved.
External Threat
An external threat includes:
•individuals outside an organization
attempting to gain
unauthorized access to an
organization’s networks using the
Internet, other networks, or dial-up
modems.
•flooding a network with large
volumes of access requests so that
the network is unable to respond to
legitimate requests, one type of
denial-of-service attack.
External Threat
External Accidents
•Modern business computer systems are large and distributed. In
addition to an organization’s internal network, many important
components reside on the public Internet. This means that a complex
chain of events can affect an IT database in unpredictable ways. For
example, a heavy storm in one region of the country can cut power to a
server that stores software licenses for other servers. With licenses
unavailable, database backup software may not function at its
scheduled time, leaving the database open to irreversible corruption.
External Threat
External Attacks
•The most frightening attacks come from skilled and sophisticated
external hackers. These attackers can find network vulnerabilities or
socially manipulate insiders to get past outer network defenses. Since
an organization’s software applications maintain open connections to
IT databases, hackers seek to take control of these applications after
they get inside, often by seeking application passwords set to their
defaults
Insider Vs External Threats
•A threat originating outside a
company, government agency, or
institution. In contrast, an internal
threat is one originating inside the
organization.
•The relative susceptibility to
insider- and outsider-originated
attacks depends on many factors.
Let’s discuss some of them
Insider Vs External Threats
• Only 39 percent of survey
respondents said they were
victims of a cyberattack
• 16% were attacked from an
external source
• 13% were attacked from an
internal source
• 10% were attacked from both
internal and external sources
• 61% reported that they were
not attacked
Insider Vs External Threats
• Personnel security. Some organizations carefully screen all
personnel before they are allowed access to computing systems, to
determine whether their background is sufficiently unblemished to
merit trust in them. Good personnel security substantially diminishes
the threat of an insider attack.
• Network architecture. Networks that have traffic screening and
security management barriers generally provide less opportunity for
outsider attacks than do those that do not. Multiple entry points (as
opposed to a single entry point) into a network are more conducive
to outsider attacks.
Insider Vs External Threats
• Intrusion detection capabilities. Deploying intrusion detection
tools appropriately and taking the time to carefully investigate the
data they provide can also affect the relative proportion of insider
versus outsider attacks. Most of today's commercial intrusion
detection tools are better at discovering outsider attacks. Most
current attacks on networks and the systems therein do not occur at
a single point in time, they often occur over a period of days, weeks
and even months. Intrusion detection tools can help shut these
attacks off by enabling an organization to discover an attack early,
thereby enabling network and security administrators to change
packet-filtering rules, disconnect target machines from the network,
and take other evasive measures to prevent further, successful
attacks. The overall result is less likelihood of outsider attacks
(although insider attacks can also be reduced in a similar manner).
References
• https://www.us-cert.gov/sites/default/files/publications/Combating%20the%20Insider
%20Threat_0.pdf
• http://www.thesecurityco.com/media/40631/Whitepaper-insider-threat_January2013.pdf
• http://www.yourdictionary.com/external-threat
• http://education-portal.com/academy/lesson/external-opportunities-threats-in-swot-analysis-
examples-definition-quiz.html#lesson
• http://itlaw.wikia.com/wiki/External_threat
• http://searchsecurity.techtarget.com/tip/The-worse-of-two-evils-Internal-vs-external-security-
threats
• http://www.integritysrc.com/blog/223-internal-vs-external-threats-which-one-worries-you-more
• http://smallbusiness.chron.com/difference-between-internal-external-threats-database-
74165.html
• https://www.saintcorporation.com/solutions/smallBusiness.html
Question time!!!
Thank you~~~

More Related Content

What's hot

Unintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric ColeUnintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric Cole
David Mai, MBA
 
5 Signs you have an Insider Threat
5 Signs you have an Insider Threat5 Signs you have an Insider Threat
5 Signs you have an Insider Threat
Lancope, Inc.
 
Insider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat DetectionInsider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat Detection
ObserveIT
 
Insider threat kill chain
Insider threat   kill chainInsider threat   kill chain
Insider threat kill chain
Tarun Gupta,CRISC CISSP CISM CISA BCCE
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRI
Zivaro Inc
 
Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?
ObserveIT
 
Cyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cyber Summit 2016: Insider Threat Indicators: Human BehaviourCyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cybera Inc.
 
Insider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint PreziInsider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint PreziKashif Semple
 
Cyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutionsCyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutions
Capri Insurance
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
Stephen Cobb
 
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsPhish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
ObserveIT
 
ObserveIT Webinar: Privileged Identity Management
ObserveIT Webinar: Privileged Identity ManagementObserveIT Webinar: Privileged Identity Management
ObserveIT Webinar: Privileged Identity Management
ObserveIT
 
How to Implement an Insider Threat Program
How to Implement an Insider Threat ProgramHow to Implement an Insider Threat Program
How to Implement an Insider Threat Program
ObserveIT
 
Insider threat
Insider threatInsider threat
Insider threat
ARCON TECHSOLUTIONS
 
Anatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyAnatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The Ugly
Resilient Systems
 
Proactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider ThreatProactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider Threat
Andrew Case
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity Risk
WPICPE
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
Sarah Cirelli
 

What's hot (20)

Unintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric ColeUnintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric Cole
 
5 Signs you have an Insider Threat
5 Signs you have an Insider Threat5 Signs you have an Insider Threat
5 Signs you have an Insider Threat
 
Insider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat DetectionInsider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat Detection
 
Insider threat kill chain
Insider threat   kill chainInsider threat   kill chain
Insider threat kill chain
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRI
 
Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?
 
Insider threat v3
Insider threat v3Insider threat v3
Insider threat v3
 
Cyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cyber Summit 2016: Insider Threat Indicators: Human BehaviourCyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cyber Summit 2016: Insider Threat Indicators: Human Behaviour
 
Ht t17
Ht t17Ht t17
Ht t17
 
Insider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint PreziInsider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint Prezi
 
Cyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutionsCyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutions
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
 
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsPhish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
 
ObserveIT Webinar: Privileged Identity Management
ObserveIT Webinar: Privileged Identity ManagementObserveIT Webinar: Privileged Identity Management
ObserveIT Webinar: Privileged Identity Management
 
How to Implement an Insider Threat Program
How to Implement an Insider Threat ProgramHow to Implement an Insider Threat Program
How to Implement an Insider Threat Program
 
Insider threat
Insider threatInsider threat
Insider threat
 
Anatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyAnatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The Ugly
 
Proactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider ThreatProactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider Threat
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity Risk
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
 

Viewers also liked

Difficulty Paper: Salvatori's Basic Assignment
Difficulty Paper: Salvatori's Basic AssignmentDifficulty Paper: Salvatori's Basic Assignment
Difficulty Paper: Salvatori's Basic Assignment
Ilene Dawn Alexander
 
Amy Haddad: Difficulty Paper Handout for Students
Amy Haddad: Difficulty Paper Handout for StudentsAmy Haddad: Difficulty Paper Handout for Students
Amy Haddad: Difficulty Paper Handout for Students
Center for Teaching & Learning - University of Minnesota
 
Amy Haddad: Analysis of Difficulty Paper Assignment
Amy Haddad: Analysis of Difficulty Paper AssignmentAmy Haddad: Analysis of Difficulty Paper Assignment
Amy Haddad: Analysis of Difficulty Paper Assignment
Center for Teaching & Learning - University of Minnesota
 
Analysing your assignment/thesis topic
Analysing your assignment/thesis topicAnalysing your assignment/thesis topic
Analysing your assignment/thesis topic
Susanne Noll
 
Protecting Data in Untrusted Locations
Protecting Data in Untrusted LocationsProtecting Data in Untrusted Locations
Protecting Data in Untrusted Locations
Jan Schaumann
 
The Thing About Protecting Data Is, You Have To Protect Data
The Thing About Protecting Data Is, You Have To Protect DataThe Thing About Protecting Data Is, You Have To Protect Data
The Thing About Protecting Data Is, You Have To Protect Data
Andy LoPresto
 
Tools and tips for protecting value in start-up companies
Tools and tips for protecting value in start-up companiesTools and tips for protecting value in start-up companies
Tools and tips for protecting value in start-up companies
Johan Örneblad
 
Vegas in may part 2 ppsx
Vegas in may part 2 ppsxVegas in may part 2 ppsx
Vegas in may part 2 ppsxSusan Joyce
 
12 Steps on the Journey Towards Valuable Data
12 Steps on the Journey Towards Valuable Data12 Steps on the Journey Towards Valuable Data
12 Steps on the Journey Towards Valuable Data
Jason Edge
 
The Insider's Guide to the Insider Threat
The Insider's Guide to the Insider ThreatThe Insider's Guide to the Insider Threat
The Insider's Guide to the Insider Threat
Imperva
 
Why Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level PriorityWhy Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level Priority
ObserveIT
 
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
Fuji Xerox Asia Pacific
 
ObserveIT - Unintentional Insider Threat featuring Dr. Eric Cole
ObserveIT - Unintentional Insider Threat featuring Dr. Eric ColeObserveIT - Unintentional Insider Threat featuring Dr. Eric Cole
ObserveIT - Unintentional Insider Threat featuring Dr. Eric Cole
ObserveIT
 
Gov Day Sacramento 2015 - User Behavior Analytics
Gov Day Sacramento 2015 - User Behavior AnalyticsGov Day Sacramento 2015 - User Behavior Analytics
Gov Day Sacramento 2015 - User Behavior Analytics
Splunk
 
Software proposal sample_project_1-_web_site_development_by_zx_7_of_november_...
Software proposal sample_project_1-_web_site_development_by_zx_7_of_november_...Software proposal sample_project_1-_web_site_development_by_zx_7_of_november_...
Software proposal sample_project_1-_web_site_development_by_zx_7_of_november_...
Oleg Zhuravlev
 
Protecting Data Everywhere - Barracuda
Protecting Data Everywhere - BarracudaProtecting Data Everywhere - Barracuda
Protecting Data Everywhere - Barracuda
MarcoTechnologies
 
Supercharging the Value of Your Data with Amazon S3
Supercharging the Value of Your Data with Amazon S3Supercharging the Value of Your Data with Amazon S3
Supercharging the Value of Your Data with Amazon S3
Amazon Web Services
 

Viewers also liked (17)

Difficulty Paper: Salvatori's Basic Assignment
Difficulty Paper: Salvatori's Basic AssignmentDifficulty Paper: Salvatori's Basic Assignment
Difficulty Paper: Salvatori's Basic Assignment
 
Amy Haddad: Difficulty Paper Handout for Students
Amy Haddad: Difficulty Paper Handout for StudentsAmy Haddad: Difficulty Paper Handout for Students
Amy Haddad: Difficulty Paper Handout for Students
 
Amy Haddad: Analysis of Difficulty Paper Assignment
Amy Haddad: Analysis of Difficulty Paper AssignmentAmy Haddad: Analysis of Difficulty Paper Assignment
Amy Haddad: Analysis of Difficulty Paper Assignment
 
Analysing your assignment/thesis topic
Analysing your assignment/thesis topicAnalysing your assignment/thesis topic
Analysing your assignment/thesis topic
 
Protecting Data in Untrusted Locations
Protecting Data in Untrusted LocationsProtecting Data in Untrusted Locations
Protecting Data in Untrusted Locations
 
The Thing About Protecting Data Is, You Have To Protect Data
The Thing About Protecting Data Is, You Have To Protect DataThe Thing About Protecting Data Is, You Have To Protect Data
The Thing About Protecting Data Is, You Have To Protect Data
 
Tools and tips for protecting value in start-up companies
Tools and tips for protecting value in start-up companiesTools and tips for protecting value in start-up companies
Tools and tips for protecting value in start-up companies
 
Vegas in may part 2 ppsx
Vegas in may part 2 ppsxVegas in may part 2 ppsx
Vegas in may part 2 ppsx
 
12 Steps on the Journey Towards Valuable Data
12 Steps on the Journey Towards Valuable Data12 Steps on the Journey Towards Valuable Data
12 Steps on the Journey Towards Valuable Data
 
The Insider's Guide to the Insider Threat
The Insider's Guide to the Insider ThreatThe Insider's Guide to the Insider Threat
The Insider's Guide to the Insider Threat
 
Why Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level PriorityWhy Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level Priority
 
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
 
ObserveIT - Unintentional Insider Threat featuring Dr. Eric Cole
ObserveIT - Unintentional Insider Threat featuring Dr. Eric ColeObserveIT - Unintentional Insider Threat featuring Dr. Eric Cole
ObserveIT - Unintentional Insider Threat featuring Dr. Eric Cole
 
Gov Day Sacramento 2015 - User Behavior Analytics
Gov Day Sacramento 2015 - User Behavior AnalyticsGov Day Sacramento 2015 - User Behavior Analytics
Gov Day Sacramento 2015 - User Behavior Analytics
 
Software proposal sample_project_1-_web_site_development_by_zx_7_of_november_...
Software proposal sample_project_1-_web_site_development_by_zx_7_of_november_...Software proposal sample_project_1-_web_site_development_by_zx_7_of_november_...
Software proposal sample_project_1-_web_site_development_by_zx_7_of_november_...
 
Protecting Data Everywhere - Barracuda
Protecting Data Everywhere - BarracudaProtecting Data Everywhere - Barracuda
Protecting Data Everywhere - Barracuda
 
Supercharging the Value of Your Data with Amazon S3
Supercharging the Value of Your Data with Amazon S3Supercharging the Value of Your Data with Amazon S3
Supercharging the Value of Your Data with Amazon S3
 

Similar to The insider versus external threat

Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badbanerjeea
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
CBIZ, Inc.
 
Countering Advanced Persistent Threats
Countering Advanced Persistent ThreatsCountering Advanced Persistent Threats
Countering Advanced Persistent Threats
Booz Allen Hamilton
 
COMPUTER APPLICATIONS Module 4.pptx
COMPUTER APPLICATIONS Module 4.pptxCOMPUTER APPLICATIONS Module 4.pptx
COMPUTER APPLICATIONS Module 4.pptx
Arti Parab Academics
 
Insider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdfInsider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdf
ramsetl
 
Zero Trust.pptx
Zero Trust.pptxZero Trust.pptx
Zero Trust.pptx
ThavaselviMunusamy1
 
Threats in network that can be noted in security
Threats in network that can be noted in securityThreats in network that can be noted in security
Threats in network that can be noted in security
ssuserec53e73
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber Security
Imperva
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
Marlabs
 
Benefit from Penetration Testing Certification
Benefit from Penetration Testing CertificationBenefit from Penetration Testing Certification
Benefit from Penetration Testing Certification
shanaadams190
 
Insider threats
Insider threatsInsider threats
Insider threats
izoologic
 
module 1 Cyber Security Concepts
module 1 Cyber Security Conceptsmodule 1 Cyber Security Concepts
module 1 Cyber Security Concepts
Sitamarhi Institute of Technology
 
Top Companies Providing Cyber Security in Europe
Top Companies Providing Cyber Security in EuropeTop Companies Providing Cyber Security in Europe
Top Companies Providing Cyber Security in Europe
roxanaaleena
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
Netpluz Asia Pte Ltd
 
FBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareFBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from Ransomware
David Sweigert
 
Synack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack cirtical infrasructure webinar
Synack cirtical infrasructure webinar
Synack
 
How to Protect your organization from within.pptx
How to Protect your organization from within.pptxHow to Protect your organization from within.pptx
How to Protect your organization from within.pptx
JosephMwakai
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
Sweta Kumari Barnwal
 
Cyber Crime and Security Ch 1 .ppt
Cyber Crime and Security Ch 1 .pptCyber Crime and Security Ch 1 .ppt
Cyber Crime and Security Ch 1 .ppt
waleejhaider1
 

Similar to The insider versus external threat (20)

Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-bad
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
 
Countering Advanced Persistent Threats
Countering Advanced Persistent ThreatsCountering Advanced Persistent Threats
Countering Advanced Persistent Threats
 
COMPUTER APPLICATIONS Module 4.pptx
COMPUTER APPLICATIONS Module 4.pptxCOMPUTER APPLICATIONS Module 4.pptx
COMPUTER APPLICATIONS Module 4.pptx
 
Insider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdfInsider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdf
 
Zero Trust.pptx
Zero Trust.pptxZero Trust.pptx
Zero Trust.pptx
 
Threats in network that can be noted in security
Threats in network that can be noted in securityThreats in network that can be noted in security
Threats in network that can be noted in security
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber Security
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Benefit from Penetration Testing Certification
Benefit from Penetration Testing CertificationBenefit from Penetration Testing Certification
Benefit from Penetration Testing Certification
 
Insider threats
Insider threatsInsider threats
Insider threats
 
module 1 Cyber Security Concepts
module 1 Cyber Security Conceptsmodule 1 Cyber Security Concepts
module 1 Cyber Security Concepts
 
Module 1.pdf
Module 1.pdfModule 1.pdf
Module 1.pdf
 
Top Companies Providing Cyber Security in Europe
Top Companies Providing Cyber Security in EuropeTop Companies Providing Cyber Security in Europe
Top Companies Providing Cyber Security in Europe
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
 
FBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareFBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from Ransomware
 
Synack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack cirtical infrasructure webinar
Synack cirtical infrasructure webinar
 
How to Protect your organization from within.pptx
How to Protect your organization from within.pptxHow to Protect your organization from within.pptx
How to Protect your organization from within.pptx
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
 
Cyber Crime and Security Ch 1 .ppt
Cyber Crime and Security Ch 1 .pptCyber Crime and Security Ch 1 .ppt
Cyber Crime and Security Ch 1 .ppt
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 

The insider versus external threat

  • 1. The Insider versus External Threat Zhi Hao Chen(30113181) Pavan Geddam(30127867) Sasidhar Bandla(30121080)
  • 2. The Insider Threat • What is insider threat? An insider threat is generally defined as a current or former employee, contractor, or other business partner who has or had authorized access to an organization's network, system, or data and intentionally misused that access to negatively affect the confidentiality, integrity, or availability of the organization's information or information systems. Insiders do not always act alone and may not be aware they are aiding a threat actor (i.e. the unintentional insider threat).
  • 3. The Insider Threat • Some characteristics of Insiders at Risk of Becoming a Threat 1. Greed/ financial need 2. Reduced loyalty 3. Pattern of frustration and disappointment 4. Inability to assume responsibility for their actions
  • 4. The Insider Threat How to know who is insider Acting differently Download or copy more information from the company than they should know Working long hours than others
  • 5. The Insider Threat Decrease insider threat • Training employees to recognize phishing and other social media threat vectors • Train continuously to maintain the proper levels of knowledge skills and abilities • Maintain staff values and attitudes that align with organizational mission and ethics • Improve usability of security tools • Improve usability of software to reduce the likelihood of system-induced human error
  • 6. The Insider Threat  Defend your organisation from insider crime by: • Effective supervision – set the tone from the top • An anti-fraud strategy, tailored to the needs of the particular organisation • Listening to staff concerns and encouraging them to speak up • Looking for weaknesses in controls and systems • Technical controls such as server room audit trails and disabled USB access to prevent data theft • Effective pre-employment screening • Disabling access privileges on termination of employment • Be honest – report fraud, prosecute if necessary and give truthful references for employees
  • 7. External Threat •External threats are anything from your organization's outside environment that can adversely affect its performance or achievement of its goals. Ironically, stronger organizations can be exposed to a greater level of threats than weaker organizations because success breeds envy and competition to take what your organization has achieved.
  • 8. External Threat An external threat includes: •individuals outside an organization attempting to gain unauthorized access to an organization’s networks using the Internet, other networks, or dial-up modems. •flooding a network with large volumes of access requests so that the network is unable to respond to legitimate requests, one type of denial-of-service attack.
  • 9. External Threat External Accidents •Modern business computer systems are large and distributed. In addition to an organization’s internal network, many important components reside on the public Internet. This means that a complex chain of events can affect an IT database in unpredictable ways. For example, a heavy storm in one region of the country can cut power to a server that stores software licenses for other servers. With licenses unavailable, database backup software may not function at its scheduled time, leaving the database open to irreversible corruption.
  • 10. External Threat External Attacks •The most frightening attacks come from skilled and sophisticated external hackers. These attackers can find network vulnerabilities or socially manipulate insiders to get past outer network defenses. Since an organization’s software applications maintain open connections to IT databases, hackers seek to take control of these applications after they get inside, often by seeking application passwords set to their defaults
  • 11. Insider Vs External Threats •A threat originating outside a company, government agency, or institution. In contrast, an internal threat is one originating inside the organization. •The relative susceptibility to insider- and outsider-originated attacks depends on many factors. Let’s discuss some of them
  • 12. Insider Vs External Threats • Only 39 percent of survey respondents said they were victims of a cyberattack • 16% were attacked from an external source • 13% were attacked from an internal source • 10% were attacked from both internal and external sources • 61% reported that they were not attacked
  • 13. Insider Vs External Threats • Personnel security. Some organizations carefully screen all personnel before they are allowed access to computing systems, to determine whether their background is sufficiently unblemished to merit trust in them. Good personnel security substantially diminishes the threat of an insider attack. • Network architecture. Networks that have traffic screening and security management barriers generally provide less opportunity for outsider attacks than do those that do not. Multiple entry points (as opposed to a single entry point) into a network are more conducive to outsider attacks.
  • 14. Insider Vs External Threats • Intrusion detection capabilities. Deploying intrusion detection tools appropriately and taking the time to carefully investigate the data they provide can also affect the relative proportion of insider versus outsider attacks. Most of today's commercial intrusion detection tools are better at discovering outsider attacks. Most current attacks on networks and the systems therein do not occur at a single point in time, they often occur over a period of days, weeks and even months. Intrusion detection tools can help shut these attacks off by enabling an organization to discover an attack early, thereby enabling network and security administrators to change packet-filtering rules, disconnect target machines from the network, and take other evasive measures to prevent further, successful attacks. The overall result is less likelihood of outsider attacks (although insider attacks can also be reduced in a similar manner).
  • 15. References • https://www.us-cert.gov/sites/default/files/publications/Combating%20the%20Insider %20Threat_0.pdf • http://www.thesecurityco.com/media/40631/Whitepaper-insider-threat_January2013.pdf • http://www.yourdictionary.com/external-threat • http://education-portal.com/academy/lesson/external-opportunities-threats-in-swot-analysis- examples-definition-quiz.html#lesson • http://itlaw.wikia.com/wiki/External_threat • http://searchsecurity.techtarget.com/tip/The-worse-of-two-evils-Internal-vs-external-security- threats • http://www.integritysrc.com/blog/223-internal-vs-external-threats-which-one-worries-you-more • http://smallbusiness.chron.com/difference-between-internal-external-threats-database- 74165.html • https://www.saintcorporation.com/solutions/smallBusiness.html