SlideShare une entreprise Scribd logo
1  sur  18
Computer Security Management
(ISYS20261)
Lecture 3 – Attackers




 Module Leader: Dr Xiaoqi Ma
 School of Science and Technology
The story so far …

• Security requirements:
  – Confidentiality
  – Integrity
  – Availability

• Information related assets:
  – data
  – software
  – hardware

• Need to be protect assets from harm
• Threat: possible source of harm to an asset




Computer Security Management
Page 2
Remember definitions?

• Harm
  – Something happens to an asset that we do not want to happen

• Threat
  – Possible source of harm

• Attack
  – Threatening event (instance of a threat)

• Attacker
  – Someone or something that mounts a threat

• Vulnerability
  – Weakness in the system (asset) that makes an attack more likely to successes

• Risk
  – Possibility that a threat will affect the business or organisation

Computer Security Management
Page 3
Last week …

• Six basic types of harm
• A threat is a possible source of harm
• A threat exploits vulnerabilities in a system
• We need to satisfy our information security requirements
• Need to put controls in place to defend ourselves




Computer Security Management
Page 4
Defend against whom?

• Malicious entity (human or computer program) that tries to
  compromise information security requirements (CIA)
• Might attempt to:
  – discover secrets,
  – corrupt data,
  – spoof the identity of a message sender or receiver,
  – or force system downtime.

• Attacker differ in
  – Motivation
  – Ability
  – Resources
  – Readiness to assume risk

• We need to know what type of attacker we are facing to select
  effective security measures
Computer Security Management
Page 5
Attack sophistication vs. attacker technical
                                         Auto Coordinated
knowledge                      Cross site scripting       Tools
                                                                 “stealth” / advanced
       High                                                                  scanning
                                                                           techniques
                                              packet spoofing denial of service                 Staged

                                                     sniffers                              distributed
                                                                                           attack tools
 Intruder                                         sweepers                           www attacks
 Knowledge
                                                                          automated probes/scans
                                                                         GUI
                                       back doors
                               disabling audits              network mgmt. diagnostics
                                                      hijacking
                                           burglaries sessions
Attack                                exploiting known vulnerabilities
Sophistication
                                      password cracking
                                    self-replicating code
                          password guessing
                                                                                   Intruders
       Low
                 1980               1985               1990                 1995             2000
Computer Security Management
Page 6
Types of attackers (A. Sasse, based on
Schneier, 2003)
• Opportunist
• Emotional attacker
• Cold intellectual attacker
• Terrorist
• Insider




Computer Security Management
Page 7
Opportunist

• Most common type of attacker
• Spots and seizes an opportunity
• Convinced they will not get caught
• Highly risk-averse




Computer Security Management
Page 8
Emotional attacker

• Wants to make a statement
• Accepts high level of risk
• Motivation:
  – Revenge
  – Just for fun
  – Cries for help




Computer Security Management
Page 9
Cold intellectual attacker

• Professional who attacks for personal material gain
• High skill level
• Has resources available
• Highly risk-aversive
• Might use insiders to carry out attacks




Computer Security Management
Page 10
Terrorist

• Wants to make a statement or intimidate
• Wants to gain visibility
• Accepts high risk
• Not deterred by sophisticated countermeasures
• Might see countermeasures as challenge




Computer Security Management
Page 11
Insider

• Employees are still one of the biggest threats to corporate IT
  security both through malicious and accidental actions.
• “Statistics show that 70 per cent of fraud is perpetrated by staff
  rather than by external people or events. We invest up to 90 per
  cent of our security resources on controls and monitoring against
  internal threats." (Mitsubishi UFJ Securities International, 2008)
• Insider are often tricked into the attack by a third party, e.g.
  through social engineering




Computer Security Management
Page 12
Insider (2)

• Unwitting pawn for another insider or outsider
• Insider intents to perpetrate or facilitate the attack, alone or in
  collusion with other parties, e.g.
  – Forced to carry out the attack, e.g. through blackmail, hostage
  – Groomed to carry out the attack, e.g. lonely person befriended by somebody
    they will now do anything for
  – Motivated by expected personal gain




Computer Security Management
Page 13
Insider attackers
• Age 18-59
• 42% female
• Variety of positions
  – 31% service
  – 23% admin
  – 19% professional
  – 23% technical

• 17% have sysadmin/root access
• 15% regarded as difficult to manage
• 19% perceived by others as disgruntled employees
• 27% had come to attention of a supervisor and/or co-worker prior
  to the incident
• 27% had prior arrests
Computer Security Management
Page 14
Types of insider attacks

• Leaking of information:
  – insider copies information and using it for own purpose

• Data or service theft:
  – Removal of data or software

• Tampering with data or system
  – Changing data or software in the system or tampering with procedures

• Sabotage
  – Changing data or software in the system so that the system does not work
    properly (might not be immediately apparent)

• Vandalism
  – Immediately visible and usually aimed to stop the system from working




Computer Security Management
Page 15
Precursors of insider attacks

• Deliberate markers
  – To make a statement

• Meaningful errors
  – Attacker makes error whilst trying to cover their tracks by deleting logfiles

• Preparatory behaviour
  – Collecting information, testing countermeasures, checking permissions

• Correlated usage pattern
  – might reveal a systematic attempt to collect information

• Verbal behaviour
  – E.g. hints to friends, threats, unhappiness with the organisation …

• Personality traits
  – Introversion, loners …

Computer Security Management
Page 16
Motivation

• Material gain
• Revenge
• Improve position within the organisation
• Improve esteem in the eyes of others
• Thrill-seeking




Computer Security Management
Page 17
Means of attacks

• In 87% of the cases: insider employed simple, legitimate user
  commands to carry out attack
• In 78% of the cases: authorised users
• In 43% of the cases: attacker used their own username and
  password!
• 26% used someone else’s account (unattended terminal with open
  user account or social engineering)
• 70% exploited vulnerabilities in systems and/or procedures
• 39% were unaware of organisation’s technical security measure!




Computer Security Management
Page 18

Contenu connexe

Tendances

Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...HITCON GIRLS
 
Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaNew Horizons Bulgaria
 
Protocols and Practices in Using Encryption Chapter 4
Protocols and Practices in Using Encryption Chapter 4Protocols and Practices in Using Encryption Chapter 4
Protocols and Practices in Using Encryption Chapter 4AfiqEfendy Zaen
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolschrizjohn896
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptshreya_omar
 
Cyber Security-Ethical Hacking
Cyber Security-Ethical HackingCyber Security-Ethical Hacking
Cyber Security-Ethical HackingViral Parmar
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptSHAHID ANSARI
 
Keynote - Jim Geovedi - professional-hackers
Keynote - Jim Geovedi - professional-hackersKeynote - Jim Geovedi - professional-hackers
Keynote - Jim Geovedi - professional-hackersidsecconf
 
Ethical hacking ppt_presentation_way2project_in
Ethical hacking ppt_presentation_way2project_inEthical hacking ppt_presentation_way2project_in
Ethical hacking ppt_presentation_way2project_inmuhamedwaseem09
 
Information Security Awareness
Information Security AwarenessInformation Security Awareness
Information Security AwarenessDigit Oktavianto
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingSaqib Raza
 
Ethical hacking11601031 (1)
Ethical hacking11601031 (1)Ethical hacking11601031 (1)
Ethical hacking11601031 (1)Mohammad Affan
 
Insider threat webinar slides no cn
Insider threat webinar slides   no cnInsider threat webinar slides   no cn
Insider threat webinar slides no cnDevOps.com
 

Tendances (16)

Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 
Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons Bulgaria
 
Protocols and Practices in Using Encryption Chapter 4
Protocols and Practices in Using Encryption Chapter 4Protocols and Practices in Using Encryption Chapter 4
Protocols and Practices in Using Encryption Chapter 4
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Computer security
Computer securityComputer security
Computer security
 
Cyber Security-Ethical Hacking
Cyber Security-Ethical HackingCyber Security-Ethical Hacking
Cyber Security-Ethical Hacking
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Keynote - Jim Geovedi - professional-hackers
Keynote - Jim Geovedi - professional-hackersKeynote - Jim Geovedi - professional-hackers
Keynote - Jim Geovedi - professional-hackers
 
Ethical hacking ppt_presentation_way2project_in
Ethical hacking ppt_presentation_way2project_inEthical hacking ppt_presentation_way2project_in
Ethical hacking ppt_presentation_way2project_in
 
Information Security Awareness
Information Security AwarenessInformation Security Awareness
Information Security Awareness
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking11601031 (1)
Ethical hacking11601031 (1)Ethical hacking11601031 (1)
Ethical hacking11601031 (1)
 
10a98 virus111
10a98 virus11110a98 virus111
10a98 virus111
 
Insider threat webinar slides no cn
Insider threat webinar slides   no cnInsider threat webinar slides   no cn
Insider threat webinar slides no cn
 

Similaire à Isys20261 lecture 03

Cyber crime trends in 2013
Cyber crime trends in 2013 Cyber crime trends in 2013
Cyber crime trends in 2013 The eCore Group
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber securityankit gandharkar
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 
Final presentation of IT security project
Final presentation of IT security projectFinal presentation of IT security project
Final presentation of IT security projectArmandas Rokas
 
Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking OverviewSubhoneel Datta
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guidePankaj Dubey
 
Offensive malware usage and defense
Offensive malware usage and defenseOffensive malware usage and defense
Offensive malware usage and defenseChristiaan Beek
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hackingVishal Kumar
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxRoshni814224
 
CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?RONIKMEHRA
 
Anatomy of an Attack
Anatomy of an AttackAnatomy of an Attack
Anatomy of an Attackspoofyroot
 
EN-Ethical-Hacking-2023-18-08-03-26-15.pdf
EN-Ethical-Hacking-2023-18-08-03-26-15.pdfEN-Ethical-Hacking-2023-18-08-03-26-15.pdf
EN-Ethical-Hacking-2023-18-08-03-26-15.pdfssuser886cfe
 
EN-Ethical Hacking.pdf
EN-Ethical Hacking.pdfEN-Ethical Hacking.pdf
EN-Ethical Hacking.pdfVinay379568
 
certifieced ethical hacker course old an
certifieced ethical hacker course old ancertifieced ethical hacker course old an
certifieced ethical hacker course old anradio02moura
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to HackingRishabha Garg
 
The Threat Landscape & Network Security Measures
The Threat Landscape & Network Security MeasuresThe Threat Landscape & Network Security Measures
The Threat Landscape & Network Security MeasuresCarl B. Forkner, Ph.D.
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 
Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020Arun Velayudhan
 

Similaire à Isys20261 lecture 03 (20)

Cyber crime trends in 2013
Cyber crime trends in 2013 Cyber crime trends in 2013
Cyber crime trends in 2013
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Final presentation of IT security project
Final presentation of IT security projectFinal presentation of IT security project
Final presentation of IT security project
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking Overview
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guide
 
Offensive malware usage and defense
Offensive malware usage and defenseOffensive malware usage and defense
Offensive malware usage and defense
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?
 
Anatomy of an Attack
Anatomy of an AttackAnatomy of an Attack
Anatomy of an Attack
 
EN-Ethical-Hacking-2023-18-08-03-26-15.pdf
EN-Ethical-Hacking-2023-18-08-03-26-15.pdfEN-Ethical-Hacking-2023-18-08-03-26-15.pdf
EN-Ethical-Hacking-2023-18-08-03-26-15.pdf
 
EN-Ethical Hacking.pdf
EN-Ethical Hacking.pdfEN-Ethical Hacking.pdf
EN-Ethical Hacking.pdf
 
certifieced ethical hacker course old an
certifieced ethical hacker course old ancertifieced ethical hacker course old an
certifieced ethical hacker course old an
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
The Threat Landscape & Network Security Measures
The Threat Landscape & Network Security MeasuresThe Threat Landscape & Network Security Measures
The Threat Landscape & Network Security Measures
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Zero Trust.pptx
Zero Trust.pptxZero Trust.pptx
Zero Trust.pptx
 
Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020
 

Plus de Wiliam Ferraciolli

Lecture 12 monitoring the network
Lecture 12   monitoring the networkLecture 12   monitoring the network
Lecture 12 monitoring the networkWiliam Ferraciolli
 
Lecture 11 managing the network
Lecture 11   managing the networkLecture 11   managing the network
Lecture 11 managing the networkWiliam Ferraciolli
 
Lecture 10 the user experience
Lecture 10   the user experienceLecture 10   the user experience
Lecture 10 the user experienceWiliam Ferraciolli
 
Lecture 10 the user experience (1)
Lecture 10   the user experience (1)Lecture 10   the user experience (1)
Lecture 10 the user experience (1)Wiliam Ferraciolli
 
Lecture 7 naming and structuring objects
Lecture 7   naming and structuring objectsLecture 7   naming and structuring objects
Lecture 7 naming and structuring objectsWiliam Ferraciolli
 
Lecture 5&6 corporate architecture
Lecture 5&6   corporate architectureLecture 5&6   corporate architecture
Lecture 5&6 corporate architectureWiliam Ferraciolli
 
Lecture 3 more on servers and services
Lecture 3   more on servers and servicesLecture 3   more on servers and services
Lecture 3 more on servers and servicesWiliam Ferraciolli
 
Lecture 2 servers and services
Lecture 2   servers and servicesLecture 2   servers and services
Lecture 2 servers and servicesWiliam Ferraciolli
 
Lecture 13, 14 & 15 c# cmd let programming and scripting
Lecture 13, 14 & 15   c# cmd let programming and scriptingLecture 13, 14 & 15   c# cmd let programming and scripting
Lecture 13, 14 & 15 c# cmd let programming and scriptingWiliam Ferraciolli
 

Plus de Wiliam Ferraciolli (20)

Lecture 12 monitoring the network
Lecture 12   monitoring the networkLecture 12   monitoring the network
Lecture 12 monitoring the network
 
Lecture 11 managing the network
Lecture 11   managing the networkLecture 11   managing the network
Lecture 11 managing the network
 
Lecture 10 the user experience
Lecture 10   the user experienceLecture 10   the user experience
Lecture 10 the user experience
 
Lecture 10 the user experience (1)
Lecture 10   the user experience (1)Lecture 10   the user experience (1)
Lecture 10 the user experience (1)
 
Lecture 9 further permissions
Lecture 9   further permissionsLecture 9   further permissions
Lecture 9 further permissions
 
Lecture 8 permissions
Lecture 8   permissionsLecture 8   permissions
Lecture 8 permissions
 
Lecture 7 naming and structuring objects
Lecture 7   naming and structuring objectsLecture 7   naming and structuring objects
Lecture 7 naming and structuring objects
 
Lecture 5&6 corporate architecture
Lecture 5&6   corporate architectureLecture 5&6   corporate architecture
Lecture 5&6 corporate architecture
 
Lecture 4 client workstations
Lecture 4   client workstationsLecture 4   client workstations
Lecture 4 client workstations
 
Lecture 3 more on servers and services
Lecture 3   more on servers and servicesLecture 3   more on servers and services
Lecture 3 more on servers and services
 
Lecture 2 servers and services
Lecture 2   servers and servicesLecture 2   servers and services
Lecture 2 servers and services
 
Lecture 1 introduction
Lecture 1   introductionLecture 1   introduction
Lecture 1 introduction
 
Lecture 13, 14 & 15 c# cmd let programming and scripting
Lecture 13, 14 & 15   c# cmd let programming and scriptingLecture 13, 14 & 15   c# cmd let programming and scripting
Lecture 13, 14 & 15 c# cmd let programming and scripting
 
Isys20261 lecture 14
Isys20261 lecture 14Isys20261 lecture 14
Isys20261 lecture 14
 
Isys20261 lecture 12
Isys20261 lecture 12Isys20261 lecture 12
Isys20261 lecture 12
 
Isys20261 lecture 11
Isys20261 lecture 11Isys20261 lecture 11
Isys20261 lecture 11
 
Isys20261 lecture 10
Isys20261 lecture 10Isys20261 lecture 10
Isys20261 lecture 10
 
Isys20261 lecture 09
Isys20261 lecture 09Isys20261 lecture 09
Isys20261 lecture 09
 
Isys20261 lecture 08
Isys20261 lecture 08Isys20261 lecture 08
Isys20261 lecture 08
 
Isys20261 lecture 07
Isys20261 lecture 07Isys20261 lecture 07
Isys20261 lecture 07
 

Isys20261 lecture 03

  • 1. Computer Security Management (ISYS20261) Lecture 3 – Attackers Module Leader: Dr Xiaoqi Ma School of Science and Technology
  • 2. The story so far … • Security requirements: – Confidentiality – Integrity – Availability • Information related assets: – data – software – hardware • Need to be protect assets from harm • Threat: possible source of harm to an asset Computer Security Management Page 2
  • 3. Remember definitions? • Harm – Something happens to an asset that we do not want to happen • Threat – Possible source of harm • Attack – Threatening event (instance of a threat) • Attacker – Someone or something that mounts a threat • Vulnerability – Weakness in the system (asset) that makes an attack more likely to successes • Risk – Possibility that a threat will affect the business or organisation Computer Security Management Page 3
  • 4. Last week … • Six basic types of harm • A threat is a possible source of harm • A threat exploits vulnerabilities in a system • We need to satisfy our information security requirements • Need to put controls in place to defend ourselves Computer Security Management Page 4
  • 5. Defend against whom? • Malicious entity (human or computer program) that tries to compromise information security requirements (CIA) • Might attempt to: – discover secrets, – corrupt data, – spoof the identity of a message sender or receiver, – or force system downtime. • Attacker differ in – Motivation – Ability – Resources – Readiness to assume risk • We need to know what type of attacker we are facing to select effective security measures Computer Security Management Page 5
  • 6. Attack sophistication vs. attacker technical Auto Coordinated knowledge Cross site scripting Tools “stealth” / advanced High scanning techniques packet spoofing denial of service Staged sniffers distributed attack tools Intruder sweepers www attacks Knowledge automated probes/scans GUI back doors disabling audits network mgmt. diagnostics hijacking burglaries sessions Attack exploiting known vulnerabilities Sophistication password cracking self-replicating code password guessing Intruders Low 1980 1985 1990 1995 2000 Computer Security Management Page 6
  • 7. Types of attackers (A. Sasse, based on Schneier, 2003) • Opportunist • Emotional attacker • Cold intellectual attacker • Terrorist • Insider Computer Security Management Page 7
  • 8. Opportunist • Most common type of attacker • Spots and seizes an opportunity • Convinced they will not get caught • Highly risk-averse Computer Security Management Page 8
  • 9. Emotional attacker • Wants to make a statement • Accepts high level of risk • Motivation: – Revenge – Just for fun – Cries for help Computer Security Management Page 9
  • 10. Cold intellectual attacker • Professional who attacks for personal material gain • High skill level • Has resources available • Highly risk-aversive • Might use insiders to carry out attacks Computer Security Management Page 10
  • 11. Terrorist • Wants to make a statement or intimidate • Wants to gain visibility • Accepts high risk • Not deterred by sophisticated countermeasures • Might see countermeasures as challenge Computer Security Management Page 11
  • 12. Insider • Employees are still one of the biggest threats to corporate IT security both through malicious and accidental actions. • “Statistics show that 70 per cent of fraud is perpetrated by staff rather than by external people or events. We invest up to 90 per cent of our security resources on controls and monitoring against internal threats." (Mitsubishi UFJ Securities International, 2008) • Insider are often tricked into the attack by a third party, e.g. through social engineering Computer Security Management Page 12
  • 13. Insider (2) • Unwitting pawn for another insider or outsider • Insider intents to perpetrate or facilitate the attack, alone or in collusion with other parties, e.g. – Forced to carry out the attack, e.g. through blackmail, hostage – Groomed to carry out the attack, e.g. lonely person befriended by somebody they will now do anything for – Motivated by expected personal gain Computer Security Management Page 13
  • 14. Insider attackers • Age 18-59 • 42% female • Variety of positions – 31% service – 23% admin – 19% professional – 23% technical • 17% have sysadmin/root access • 15% regarded as difficult to manage • 19% perceived by others as disgruntled employees • 27% had come to attention of a supervisor and/or co-worker prior to the incident • 27% had prior arrests Computer Security Management Page 14
  • 15. Types of insider attacks • Leaking of information: – insider copies information and using it for own purpose • Data or service theft: – Removal of data or software • Tampering with data or system – Changing data or software in the system or tampering with procedures • Sabotage – Changing data or software in the system so that the system does not work properly (might not be immediately apparent) • Vandalism – Immediately visible and usually aimed to stop the system from working Computer Security Management Page 15
  • 16. Precursors of insider attacks • Deliberate markers – To make a statement • Meaningful errors – Attacker makes error whilst trying to cover their tracks by deleting logfiles • Preparatory behaviour – Collecting information, testing countermeasures, checking permissions • Correlated usage pattern – might reveal a systematic attempt to collect information • Verbal behaviour – E.g. hints to friends, threats, unhappiness with the organisation … • Personality traits – Introversion, loners … Computer Security Management Page 16
  • 17. Motivation • Material gain • Revenge • Improve position within the organisation • Improve esteem in the eyes of others • Thrill-seeking Computer Security Management Page 17
  • 18. Means of attacks • In 87% of the cases: insider employed simple, legitimate user commands to carry out attack • In 78% of the cases: authorised users • In 43% of the cases: attacker used their own username and password! • 26% used someone else’s account (unattended terminal with open user account or social engineering) • 70% exploited vulnerabilities in systems and/or procedures • 39% were unaware of organisation’s technical security measure! Computer Security Management Page 18