Reducing threats from within the organization By Dr. Jim Kennedy, NMCE, CRISC, CEH, CHS-IV, MRP, CBRM Based on all of the diligent work of IT and information security organizations corporations and government agencies are beginning to see real progress on protecting their operations against external threats. However, the bad news is that we are being faced with a more difficult challenge of protecting our information assets from insider threats. Insider attacks (data leakage, intellectual property theft, and data corruption and/or loss) account for as much as 80 percent of all computer and Internet related incidents and crimes. 70 percent of corporate attacks causing at least $20,000 of damage and threats that could have impact on national security are the direct result of malicious trusted insiders. In fact, the US Secret Service - National Threat Center has indicated that: “The greatest information security threat facing your organization is in your office right now. It has the ability to bypass the physical and logical controls you have put into place to protect the perimeter of your network and has already obtained credentials to access a significant portion of your infrastructure.” There are several private sector cases and more disturbing there are also many governmental (Federal, State, and Local) that prove this out: In 2008 in San Francisco, California a disgruntled systems administrator lockout out that city government from its systems and held passwords for ransom after being fired. At the Federal level we all know about Bradley Manning and, the most famous of all, Edward Snowden who both leaked classified information. In all of the above cases the people creating the threat were trusted users. In February 2008 a Dallas based healthcare organization sent out notifications to about 37,000 patients that their personal and financial information had been compromised. A former data processor from that healthcare organization was apprehended a while later and pleaded guilty to fraudulent possession and use of stolen personal identification. In March of 2007 a spouse of a US sales person loaded unauthorized personal software on to a major pharmaceutical company’s laptop for the purpose of accessing a peer-to-peer file sharing network. That software gave other users access to address information, home and/or cell phone numbers, social security numbers, and in some instances bonus data for over 17,000 present and former employees. In another case a scientist admitted he stole $400 million in intellectual property from his former company. In 2006 healthcare workers in a NJ hospital sold patient medical and treatment information about George Clooney who was involved in a motorcycle accident to a tabloid newspaper. So we can see that information security breaches caused by insiders are occurring regularly, in all sized and types of firms and governmental organizations all across America. In fact, from 2000 to 2013 the number of reported incidents where insiders were found to be the source of information security breaches or leaks has grown exponentially. Interesting statistics Below are some interesting statistics which show that the people who cause these breaches do not require special access or advanced training. All they need is a desire, time, and simple access to the data. You can also see that the breaches turned out to be expensive to the enterprise:
So who are these insiders? Some are individuals who have malicious intent to cause harm or embarrassment to their companies or governments and others are just inattentive, bored, or complacent employees with no malicious intent at all. Malicious perpetrators:
Non-malicious individuals (employees or contractors):
What are the threats that enterprises face? Threats can be placed into four basic areas:
So what practices can be employed to help to reduce the problem? They include: 1. Implement strict password and account management policies and practices. 2. Enforce separation of duties, least privilege, and one-over-one signoff for assigning access to sensitive information or data. Rotation of assignments also helps. 3. Use extra caution in selection and training of system administration personnel. 4. Provide periodic security awareness training for all employees. 5. Log, monitor, and audit employee and especially systems administrators’ on-line actions. 6. Rotate systems administrators across systems on a regular basis. 7. Conduct enterprise-wide risk assessments regularly and, internal and external penetration tests (at least once a year). 8. Actively defend against malicious code (use people, process, and technology to accomplish). 9. Deactivate systems access ASAP following termination of employees and contractors. 10. Review administrative passwords when an administrator leaves or is terminated and change all passwords that they might have had access to (systems, network, and databases) during their time with the organization. 11. Insure that secure backup and recovery processes for critical data are in place and functioning as required. 12. Monitor and respond rapidly to all suspicious actions on systems and behavior by employees as well as administrators and systems support personnel. 13. Conduct background checks of all personnel who work inside the enterprise (employees and contractors). Don’t let familiarity cloud good judgment It is very uncomfortable to think that a colleague or friend might be capable of committing a cyber-crime or information/system security breach. They work and interact with us at work and sometimes at home with us every day. However, we must, as security and business continuity professionals, examine clearly and objectively all risks that can adversely affect our organizations. We cannot allow familiarity or complacency be the reason for our failure to protect critical, sensitive, personal data, or national security information. The author •Date: 23rd April 2014 • US/World •Type: Article • Topic: ISM
|
To submit news stories to Continuity Central, e-mail the editor. Want an RSS newsfeed for your website? Click here |
||||||||