Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Insider Threats: Understanding the Risks and Mitigation Strategies, Slides of Business Management and Analysis

This document sheds light on the issue of insider threats, revealing that approximately 60-70% of cyber attacks originate from within an organization. Examples of high-profile insider attacks, discusses findings from insider threat studies, and offers recommendations for securing against such threats. Topics covered include motivations, usual suspects, and best practices for prevention.

Typology: Slides

2011/2012

Uploaded on 12/20/2012

devashish
devashish 🇮🇳

4.3

(24)

116 documents

1 / 8

Toggle sidebar

Related documents


Partial preview of the text

Download Insider Threats: Understanding the Risks and Mitigation Strategies and more Slides Business Management and Analysis in PDF only on Docsity! Insider Threats Docsity.com “The Insider” • A trusted member of the organization • 60% to 70% of attacks came from the insider • roughly twice the number of attacks come from the inside vs. the outside Docsity.com ITS Findings • Former employees who held technical positions • Motivated by revenge • Unsophisticated methods • Attacks occurred outside of normal working hours • Remote Access Docsity.com ITS Recommendations • Restrict remote access • Restrict system administrator access • Collect information for all remote logins • Monitor failed remote logins Docsity.com Role of the Auditor • Educated and Aware Employees • Password sharing • Entrance Barriers • Sensitive information • Employee Attitude Docsity.com