Enemy at The Water Cooler
Thursday, June 17, 2010
Even Google has it!!!
Monday, June 14, 2010
DuPont Case
Thursday, June 10, 2010
Hey guys, I searched for insider threat cases in the web for you and you will be surprised to find out how many cases I found, I mean a lot!!!!
Min, 43, was accused of stealing approximately $400 million worth of information from DuPont and attempting to leak it to a third party. He is scheduled to be sentenced March 29.
According to local news reports, a naturalized U.S. citizen from China surrendered his passport and is cooperating with federal authorities. Min's attorney, Michael Mustokoff, said his client accepts responsibility for what he did.
Investigators say Min joined DuPont in 1995 but began exploring a new job opportunity in Asia in 2005 with Victrex PLC, a DuPont competitor. Shortly after opening the dialog with Victrex, Min reportedly proceeded to download approximately 22,000 abstracts from DuPont's data library and accessed about 16,700 documents. After Min gave his notice, DuPont discovered what he was up to and brought in the FBI.
In the DuPont case, Ben-Natan noted how Min downloaded tens of thousands of documents. "A normal employee wouldn't need to review 16,000 documents. Why would you? In hindsight, they would find that a normal employee wouldn't download more than a couple hundred documents a day," Ben-Natan said. "The key is to know what is normal activity so you can spot the abnormal."
you can also find more information about DuPont case in following websites:
http://www.informationweek.com/news/security/showArticle.jhtml?articleID=197006474
http://www.computerworld.com/s/article/283564/DuPont_Data_Theft_Shows_Insider_Risks
these so many cases confirm this fact that insider threat is very important issue and ignoring it can create huge losses for the companies.
thanks to these cases we can get better understanding of the ways that employees position themselves as insider threat.
these experiences created so much losses for its company but its free for you!!! so don't hesitate of reading the cases.
Inside Security Tactics
Saturday, June 5, 2010
Statistics
Thursday, June 3, 2010
Survey participants in London and New York: 600
- Departing workers who took sensitive information with them: 40%
- Portion who would provide this information if it would help to find another job: 1/3
- Percentage of employees who are aware of the illegality of stealing information: 85%
- Portion of this population who do it any way: 1/2
- Percentage who believe it will be useful it some point in the future: >50%
- Percentage who find it easier to pilfer information this year: 57%
- Percentage last year: 29%
- Percentage who claimed they would take company info if fired tomorrow: 48%
- Percentage who would download company/competitive information if their jobs are at risk: 39%
- Portion of workers who have lost loyalty to their employers because of the recession: 1/4
- Percentage of those who take information “just in case”: 64%
- Percentage who would use the information in future job negotiations: 27%
- Percentage who would use the information as tools in their new jobs: 20%
- Those who would take customer and contact details: 29%
Stuff Stolen:
- Plans and proposals: 18%
- Passwords and access codes: 13%
- Product information: 11%
Those would go out of their way:
- Percentage of workers who would strive to find the redundancy list: 32%
- Percentage of those who would bribe a co-worker in the human resources department: 43%
- Who would use their own IT-granted access rights: 37%
- Who would use personal contacts of those in the IT dep
- One in five workers (21%) let family and friends use company laptops and PCs to access the Internet.
- More than half (51%) connect their own devices or gadgets to their work PC.
- A quarter of these do so every day.
- Around 60% admit to storing personal content on their work PC.
- One in ten confessed to downloading content at work they shouldn't.
- Two thirds (62%) admitted they have a very limited knowledge of IT Security.
- More than half (51%) had no idea how to update the anti-virus protection on their company PC.
- Five percent say they have accessed areas of their IT system they shouldn't have.
Popular Case of Terry Childs
Saturday, May 29, 2010
Another video!!!
Tuesday, May 25, 2010
Office Space
Wednesday, May 19, 2010
Hello guys!!!!
Global recession causing more security risk
Saturday, May 15, 2010
According to some reports this breach may have been averted had Fannie Mae terminated Makwana's network access immediately after firing him.
Last year, Terry Childs, a San Francisco computer engineer was charged with masterminding the hijacking of the city's network when he allegedly refused to allow other administrators to get into the system; locking down law enforcement records and payroll documents.
In another 2008 incident, 21 year old David Everett, a tech support person at Wand Corporationdecided to turn to cybercrime to seek revenge on his former employer after he was laid off. Breaking into the network, Everett allegedly planted three malicious files on 1000 servers in an attempt to bring the system down. Although he did get into the system, he only managed to crash 25 computers before the company was informed of the attack by concerned customers. Earlier this year, Everett pleaded guilty to computer hacking charges and now faces 10 years in prison.
Clearly, corporations must begin to proactively protect themselves against insider cybercrime."
Ways of malicious insider's attack
Tuesday, May 11, 2010
Insider Threats e-book
Wednesday, May 5, 2010
- Pure insider
- Insider associate
- Insider affiliate
- Outside affiliate
- pure insider is the person who are employed by the company and have all access associated with it such as accessing to company's network. authors sees this group as the most important threat since they already have most of the access they need.
- On the other hand insider associates are people who employed by the company, but they do not have as many access as pure insider. for example cleaner.
- The third group is insider affiliate who are friend, spouse of employees or have some relation with them and use their credentials to gain access
- Outside affiliate are unauthorized persons who use open access to gain access to company's resources. this cases do not happen because they break into you company but because we left a door open for them. for example wireless network can act as open door for outsiders.
- It is easier: it is obvious when insiders already have access to the network of the organization they can endanger company's security easier
- most of the security devices and soft wares are implemented in order to stop external threats
- There is high chance of success since employees have detailed information and access they need so success is almost guaranteed
- since employees who have access don't break in, therefore the chance of getting caught are way lower than external one
Always scrutinize your employees
Saturday, May 1, 2010
Disclaimer
Wednesday, April 28, 2010
DISCLAIMER
This weblog is created for the purposes of an MBA project for the subject BYL 7134, Cyberlaw. The materials posted on this weblog are for the purposes of the assignment as well as study and non-profit research. Appropriate acknowledgements to the materials that do not belong to the weblog owner have been publicly made. If you are the author or a copyright owner of any of the articles posted in this weblog and you object to such posting on any grounds, including copyright infringement, please contact me and I will take your material down. I state herein that I am relying on the doctrine of fair use. Thank you for supporting my blog.
Insider Threats Cases
Tuesday, April 27, 2010
- A Management Information Systems (MIS) professional at a military facility learns she is going to be downsized. She decides to encrypt large parts of the organization’s database and hold it hostage. She contacts the systems administrator responsible for the database and offers to decode the data for $10,000 in “severance pay” and a promise of no prosecution. He agrees to her terms before consulting with proper authorities. Prosecutors reviewing the case determine that the administrator’s deal precludes them from pursuing charges.
- At the regional headquarters of an international energy company, an MIS contractor effectively “captures” and closes off the UNIX-based telephonic switching system for the entire complex. Investigators discover that the contractor had been notified a week earlier that he was being terminated in part for chronic tardiness. Further investigation finds the employee to have two prior felony convictions and to be a member of a notorious hacker group under investigation by the FBI. The employee reports he is often up all night helping colleagues with their hacking techniques. Additional investigation reveals that he is the second convicted hacker hired at this site. An earlier case involved a former member of the Legion of Doom who had been serving as a member of a corporate information security team. He had been convicted of computer intrusion at a local phone company. Neither individual had disclosed their criminal history or had been subject to background checks sufficient to discover their past activities.
- A senior MIS specialist at an international energy firm regularly created outages at Company sites around the world so that he could spend time abroad while gaining attention for his technical expertise.
- Michael Lauffenberger, a 31-year old programmer for the General Dynamics Atlas Missile Program, reportedly felt unappreciated for his programming work on a parts-tracking system. He planted a “logic bomb” in the system designed to erase critical data after he resigned. He then anticipated returning to rescue the company as a highly paid and valued consultant.
- Regional PC manager for the King Soopers supermarket chain Jay Beaman and two clerks were charged in an intricate computer fraud that cost the supermarket over two million dollars over two years. The motives are described by investigators as beginning with financial necessity but quickly escalating into greed and ego. Among the strategies used was manipulating the computer accounting system to funnel certain purchases into a dummy account. At the end of the day, the perpetrators would take the amount funneled into the dummy account right out of the cash registers and then delete the account, also erasing any trace of their fraud.
- A major international energy companyrecently discovered a logic bomb in softwarecreated by a contracted employee. It wasinstalled as “job insurance” by the contractedemployee with five prior convictions related tohacking. The contractor’s firm failed to screenthis employee who installed the code in anticipationof using it as leverage against his employer incase his criminal record was discovered.
- Zhangyi Liu, a Chinese computerprogrammer working as a subcontractor forLitton/PRC Inc., illegally accessed sensitive AirForce information on combat readiness. He alsocopied passwords, which allow users to create,change or delete any file on the network, andposted them on the Internet.
- Donald Burleson, a computer programmerfor USPA & IRA Co., a Fort Worthsecurities trading firm, designed a virus afterbeing reprimanded for storing personal letters onhis company computer. The virus was designedto erase portions of the Company’s mainframeand then repeat the process if a predeterminedvalue was not reset in a specific location. Afterbeing fired, Burleson used a duplicate set of keysto return to the facility at 3 a.m. and employ anunauthorized backdoor password to reenter thesystem and execute the virus.
- On the programming staff of Ellery Systems, a Boulder Colorado software firm working on advanced distributive computing software, was a Chinese national who transferred, via the Internet, the firms entire proprietary source code to another Chinese national working in the Denver area. The software was then transferred to a Chinese company, Beijing Machinery. Ellery Systems was subsequently driven to bankruptcy by foreign competition directly attributed to the loss of the source code.
Data breach. Inside Job???
Sunday, April 25, 2010
That's right guys, insider threats are now hot stuff!! malicious and careless users are now considered bigger threat than external ones. I mean you can establish firewall, antivirus and anti spam programs to defend your system against external threats, but when you are dealing with internal threats, you don't know where and when its going to hit you. well, you can guess the malicious ones somehow. I mean when you see an employee who is angry at the corporation, it will give you heads up.
Insider Carelessness = Big threat!!!!
Saturday, April 24, 2010