Popular Case of Terry Childs
Saturday, May 29, 2010
Another video!!!
Tuesday, May 25, 2010
Office Space
Wednesday, May 19, 2010
Hello guys!!!!
Global recession causing more security risk
Saturday, May 15, 2010
According to some reports this breach may have been averted had Fannie Mae terminated Makwana's network access immediately after firing him.
Last year, Terry Childs, a San Francisco computer engineer was charged with masterminding the hijacking of the city's network when he allegedly refused to allow other administrators to get into the system; locking down law enforcement records and payroll documents.
In another 2008 incident, 21 year old David Everett, a tech support person at Wand Corporationdecided to turn to cybercrime to seek revenge on his former employer after he was laid off. Breaking into the network, Everett allegedly planted three malicious files on 1000 servers in an attempt to bring the system down. Although he did get into the system, he only managed to crash 25 computers before the company was informed of the attack by concerned customers. Earlier this year, Everett pleaded guilty to computer hacking charges and now faces 10 years in prison.
Clearly, corporations must begin to proactively protect themselves against insider cybercrime."
Ways of malicious insider's attack
Tuesday, May 11, 2010
Insider Threats e-book
Wednesday, May 5, 2010
- Pure insider
- Insider associate
- Insider affiliate
- Outside affiliate
- pure insider is the person who are employed by the company and have all access associated with it such as accessing to company's network. authors sees this group as the most important threat since they already have most of the access they need.
- On the other hand insider associates are people who employed by the company, but they do not have as many access as pure insider. for example cleaner.
- The third group is insider affiliate who are friend, spouse of employees or have some relation with them and use their credentials to gain access
- Outside affiliate are unauthorized persons who use open access to gain access to company's resources. this cases do not happen because they break into you company but because we left a door open for them. for example wireless network can act as open door for outsiders.
- It is easier: it is obvious when insiders already have access to the network of the organization they can endanger company's security easier
- most of the security devices and soft wares are implemented in order to stop external threats
- There is high chance of success since employees have detailed information and access they need so success is almost guaranteed
- since employees who have access don't break in, therefore the chance of getting caught are way lower than external one
Always scrutinize your employees
Saturday, May 1, 2010