Section 27.257 Security Awareness: & Recognising Insider Threats Flashcards
Objective 5.6 Given a scenario, you must be able to implement security awareness practices
Security Awareness
Knowledge and understanding of security threats and mitigation measures
■ Goal: Equip individuals to recognise and respond to threats for data protection
■ Focus: Common threats, potential risks, best practices for secure digital interactions
Recognising Insider Threats
Insider Threats
Involve risks posed by individuals within an organisation
■ Threats can be intentional or unintentional, arising from various personal factors
■ Training employees to recognise anomalous behavior is essential in addressing
insider threats
Behavior Indicators
Altered State or Substance Abuse
● Employees arriving at work intoxicated or hungover may indicate personal issues
● Impaired judgment may lead to unintentional data disclosure or misconduct
● Potential for coercion into making poor security decisions
Behavior Indicators
Emotional Distress
● Signs of depression, giving away personal possessions, or emotional turmoil
● Emotional distress may lead to non-compliance with security protocols
● Vulnerability to exploitation by malicious parties
Behavior Indicators
Lifestyle Incongruences
● Employees demonstrating a lifestyle inconsistent with their finances
● Investigate cases where an employee’s spending doesn’t align with income
● Discreet investigations to rule out illicit activities, theft, or information selling
Behavior Indicators
Financial Struggles
● Employees under financial stress may express financial woes to coworkers
● Financial pressures can make individuals susceptible to bribery or data selling
● Organisations should have policies in place for handling such scenarios, like financial counseling or monitoring for unusual data access
Building a Robust Insider Threat Program
■ Establish an insider threat program to create a security culture
■ Encourage employees to report suspicious activities
■ Provide training to recognise warning signs
■ Implement policies that support mental health and financial well-being
■ Ensure fair and confidential investigation processes
■ Employ user activity monitoring tools to detect anomalous behavior while respecting employee privacy