Cyber Insider Threat Flashcards
Cyber Threat
Possibility of malicious attempt to damage or disrupt a computer network system.
Employees most significant cyber risk
Threat indicators
theft fraud sabotage espionage malware
Insider Threat Potential Risk Indicators
Foreign contacts foreign loyalty intentional mishandle of protected info Unexplained affluence, absences unauthorized removal of classification markings Working outside normal work hours security violations
UAM
User Activity Monitoring: tech capability to observe and record the actions and activities of an individual at any time on any device accessing US Gov info in order to detect insider threat and support investigations.
UAM
User Activity Monitoring: tech capability to observe and record the actions and activities of an individual at any time on any device accessing US Gov info in order to detect insider threat and support investigations.
To minimize risk and find potential risks–leads to early behaviors and indicators of insider threat
Has to definite what will be monitored
Indicate how monitoring will be instituted
inform users with banners, etc.
PAR
Prevention Assistance Response
Internet Crime Complaint Center
Receive, develop, refer cyber crime