Upton & Creese: The Danger from Within Flashcards

1
Q

(Article: Upton & Creese: The Danger from Within)

What is the paper about (Introduction)?

A
  • Insiders can do much more harm than external hackers can because they have much easier access to systems and a much greater window of opportunity  may include suspension of operations, loss of intellectual property, reputational harm, plummeting investor and customer confidence and leaks of sensitive information to third parties including the media
  • Many organizations still don’t have adequate safeguards to detect or prevent attacks involving insiders -> one reason: still in denial about the magnitude of the threat
  • Most insider attacks remain unreported due to reputational damages
  • Purpose of the research: significantly improve companies’ ability to uncover and neutralize threats from insiders
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

(Article: Upton & Creese: The Danger from Within)

COMMON PRACTICES THAT DON’T WORK AS CYBERSECURITY SAFEGUARDS: What is meant by Access Controls?

A

Access Controls: rules that prohibit people from using corporate devices for personal tasks (such as using Facebook)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(Article: Upton & Creese: The Danger from Within)

COMMON PRACTICES THAT DON’T WORK AS CYBERSECURITY SAFEGUARDS: What is meant by Vulnerability Management?

A

Vulnerability Management: security patches and virus checkers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(Article: Upton & Creese: The Danger from Within)

COMMON PRACTICES THAT DON’T WORK AS CYBERSECURITY SAFEGUARDS: What is meant by Strong Boundary Protection?

A

Strong Boundary Protection: Putting critical assets inside a hardened perimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

(Article: Upton & Creese: The Danger from Within)

COMMON PRACTICES THAT DON’T WORK AS CYBERSECURITY SAFEGUARDS: What is meant by Password Policy?

A

Password Policy: mandating complex or frequently changed password means that they often end up on Post-it notes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

(Article: Upton & Creese: The Danger from Within)

COMMON PRACTICES THAT DON’T WORK AS CYBERSECURITY SAFEGUARDS: What is meant by Awareness Policy?

A

Awareness Policy: simply requiring employees to read the company’s IT security policy annually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

(Article: Upton & Creese: The Danger from Within)

Why is it an unappreciated risk?

A
  • Insider threats come from people who exploit legitimate access to an organization’s cyberassets for unauthorized and malicious purposes or who unwittingly create vulnerability  direct employees, contractors, third-party suppliers of data and computing services
  • Attacks are growing
  • External attacks may involve the knowing or unknowing assistance of insiders
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(Article: Upton & Creese: The Danger from Within)

What is the cause of growth?

A
  • Doors that leave organizations vulnerable to insider attacks are mundane and ubiquitous
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(Article: Upton & Creese: The Danger from Within)

Causes of growth: What is meant by A DRAMATIC INCREASE IN THE SIZE AND COMPLEXITY OF IT ?

A

A DRAMATIC INCREASE IN THE SIZE AND COMPLEXITY OF IT
* Do you know which individuals are managing your cloud-based services, with whom you cohabit in those servers and how safe the servers are?
* How trustworthy are those who provide you with other outsourced activities such as call centers, logistics, cleaning, HR, and customer relationship management?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(Article: Upton & Creese: The Danger from Within)

Causes of growth: What is meant by EMPLOYEES WHO USE PERSONAL DEVICES FOR WORK ?

A

EMPLOYEES WHO USE PERSONAL DEVICES FOR WORK
* Insiders, often unwittingly, expose their employers to threats by doing work on electronic gadgets
* The devices can be as simple as flash drives or phone memory cards besides smartphones and tablets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

(Article: Upton & Creese: The Danger from Within)

Causes of growth: What is meant by THE EXPLOSION IN SOCIAL MEDIA ?

A

THE EXPLOSION IN SOCIAL MEDIA
* Social media allow all sorts of information to leak from a company and spread worldwide often without the company’s knowledge
* Also provide opportunities to recruit insiders and use them to access corporate assets  Romance scam: employee is coaxed or tricked into sharing sensitive data by a sophisticated conman posing as a suitor on a dating website
* Other strategies include using knowledge gained through social media networks to pressure employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

(Article: Upton & Creese: The Danger from Within)

WHY they do it: * Insiders who knowingly participate in cyberattacks?

A
  • Insiders who knowingly participate in cyberattacks have a broad range of motivations:
    1. financial gain
    2. revenge
    3. desire for recognition and power
    4. response to blackmail
    5. loyalty to others in the organization
    6. political beliefs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

(Article: Upton & Creese: The Danger from Within)

WHY they do it: What personality traits do Inside attackers often have ?

A
  • Insider collaboration with organized crime and activist groups is becoming increasingly common
  • Inside attackers often have some combination of these personality traits:
    1. Immaturity
    2. Low self-esteem
    3. Amorality or lack of ethics
    4. Superficiality
    5. Tendency to fantasize
    6. Restlessness and impulsiveness
    7. Lack of conscientiousness
    8. Manipulativeness
    9. Instability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

(Article: Upton & Creese: The Danger from Within)

How should we think about the problem?

A
  • Organizations can no longer anticipate every risk because the technology environment is so complex and ever changing  leaders of enterprises need everyone in the organization to be involved
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

(Article: Upton & Creese: The Danger from Within)

What should leaders do?

A

ADOPT A ROBUST INSIDER POLICY , RAISE AWARENESS, LOOK OUT FOR THREATS WHEN HIRING, EMPLOY RIGOROUS SUBCONTRACTING PROCESSES and MONITOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

(Article: Upton & Creese: The Danger from Within)

What should leaders do: What is meant by ADOPT A ROBUST INSIDER POLICY ?

A

ADOPT A ROBUST INSIDER POLICY
* Address what people must do or not do to deter insiders who introduce risk through carelessness, negligence or mistakes
* Policy must be concise and easy for everyone
* Rules must apply to all levels of the organization
* Employees should be given tools that help them to adhere to the policy
* Policy violations should incur penalties
* Help employees understand how to safely conduct day-too-day tasks

17
Q

(Article: Upton & Creese: The Danger from Within)

What should leaders do: What is meant by RAISE AWARENESS ?

A

RAISE AWARENESS
* Be open about likely threats so that people can detect them and be on guard against anyone who tries to get their assistance in an attack
* Customize training to take into account what kinds of attacks workers in a particular operation might encounter
* Encourage employees to report unusual or prohibited technologies and behavior

18
Q

(Article: Upton & Creese: The Danger from Within)

What should leaders do: What is meant by LOOK OUT FOR THREATS WHEN HIRING ?

A

LOOK OUT FOR THREATS WHEN HIRING
* Use screening processes and interview techniques designed to assess the honesty of potential hires  examples: criminal background checks, interview questions proving morale etc.
* Assess cybersafety awareness during the interview

19
Q

(Article: Upton & Creese: The Danger from Within)

What should leaders do: What is meant by EMPLOY RIGOROUS SUBCONTRACTING PROCESSES ?

A

EMPLOY RIGOROUS SUBCONTRACTING PROCESSES
* ensure that suppliers and distributors do not put you at risk
* Seek out partners and suppliers that have the same risk appetite and culture your organization does, which will make a common approach to cybersecurity much more likely AND audit them regularly

20
Q

(Article: Upton & Creese: The Danger from Within)

What should leaders do: What is meant by MONITOR ?

A

MONITOR
* Let employees know that you can and will observe their cyberactivity to the extent permitted by law
* Require security teams or service providers to produce regular risk assessments
* Have routers or firewalls that monitor outgoing channels and make sure they are functioning
* For monitoring to be effective, diligently manage the privileges of all employees
* Look for insider-threat-detection systems that can predict possible preventable events as well as find events that have already occurred
* Malware-detection software can be useful