Module 7: Handling Insider Threats Flashcards
What makes an insider threat so dangerous
They misuse their authorized privileges on resources that directly affect the CIA of the information system
What are some examples of potential impacts that insider threats have on an organization
- Bad reputation
- Stealing PII or other private information
- Website defacement
- Posting confidential information on any public website
According to EC Council what is the structure of how an insider threat occurs
- Understand business process
- Gain credentials and trust
- Install logic bombs and rootkits
- Activate those logic bombs and rootkits
- Damage the company for financial gain or revenge
What is the the greatest risk according to the insider risk matrix
If the insiders’ technical literacy and process knowledge is high
See page 415 for the graph of the matrix
What are some different ways to detect an insider threat
- Checking the logs (event, email, database, app, file access, and remote access)
- Alerts from various network security devices and applications
- Implementing control measures
- Identifying the behavior of users
What are 3 different techniques to detect an insider threat
- Correlation
- Detecting Anomaly (anything out of the norm?)
- Discovering Pattern
TRUE or FALSE: Placing suspected users in a quarantined network is a good way to response to an insider threat
TRUE
This is done so that the damage is minimized
TRUE or FALSE: The user doesn’t need to have their accounts blocked because it might tip them off they IT security is looking at them
FALSE
It is a good idea to block malicious users from their accounts as soon as possible before they do even more damage
TRUE or FALSE: The organization should not share or provide the details of the insider’s incident response plan with all employees
TRUE
The organization should share the response plan with those who have the capability to understand and perform the plan
Why is an incident response plan necessary for an insider threat situation
It helps the organization to minimize or limit the damage cause due to malicious insiders
While it may not seem important to IT Security, what are some ways HR can help to mitigate the threat of insider threat
- Background checks
- Manage negative workplace issues
- Prepare an information security policy document and have employees sign the doc
- Respond to suspicious behavior of employees
Network security is an important aspect to help mitigate insider threats by
- Configured firewalls
- Strict passwords
- DLP
- Prevent file sharing
The good news is that we have this implemented in our environment…Woot GO Team
How are users able to get access privileges
It is based on their routine performance of their job
Who should vet a user’s access requests
Their supervisor
Who should employees ask before accessing sensitive systems
Data owners