Magazine article Security Management

Studying and Stopping the Insider Threat

Magazine article Security Management

Studying and Stopping the Insider Threat

Article excerpt

While the danger of the "insider threat" has been well cataloged, the details of inside attacks have not been considered in much depth. For example, who are these insiders? And what sorts of attacks do they launch? A new joint study by the U.S. Secret Service and the CERT Coordination Center helps shed some light on these questions.

Insider Threat Study: Illicit Cyber Activity in the Banking and Financial Sector examines insider incidents "from both the behavioral and technical perspectives." Investigators carried out a thorough review of 23 incidents (from fraud and the theft of intellectual property to sabotage) perpetrated by 26 insiders and found that most incidents--87 percent--were not technically sophisticated. In these cases, "the insiders employed simple, legitimate user commands" to commit their crimes. Seventy-eight percent of the insiders were authorized users, and almost half used their own usernames and passwords in the attack.

In one case, an employee of a vendor of credit card point-of-sale terminals used social engineering to get authentication information that allowed him to add credit to his own credit card. …

Search by... Author
Show... All Results Primary Sources Peer-reviewed

Oops!

An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.