2.5 - Insider Threats
Network Security Overview
Organizations invest significant resources in securing network edges.
Tools used include firewalls and intrusion prevention systems.
These systems primarily focus on protecting the perimeter of the network.
Internal Network Vulnerability
Despite strong external security measures, internal systems remain vulnerable.
Employees within the organization often have access to sensitive systems, posing potential threats.
Possible internal threats: employees who might misuse their access.
Insider Threats
Employees may unintentionally or intentionally become threats from within the network.
Threats are not limited to careless behavior, such as writing down passwords on sticky notes.
Knowledge of Sensitive Data
Employees possess extensive knowledge about:
Locations of sensitive data.
Security methods in place to protect that data.
Techniques to copy or remove data without triggering security alerts.
Types of Insider Threats
Not only disgruntled employees but also external attackers targeting employees.
Documented incidents of recruitment by attackers to gain access and exploit insider knowledge.
Real-World Example of Insider Threats
Ransomware Attacks: Employees may be incentivized by malicious actors to introduce ransomware into the organization.
Attackers may offer financial rewards in cryptocurrencies (e.g., Bitcoin).
Example scenario:
Employee plugs a USB drive into the system, unwittingly executing ransomware.
The ransomware subsequently encrypts critical systems across the network.
Attackers profit significantly from these breaches (potentially millions of dollars).
Security Practices Revisions
Organizations are improving internal security practices to safeguard sensitive data.
Updating security best practices specifically for internal data protection.
Enhancing backup strategies to ensure data integrity and recovery capabilities.