The accessibility of insider threats on a corporate network
<p> Corporations try to defend themselves against outsider threats, but insider threats can be just as devastating. Insiders have an understanding of their organization’s critical assets, physical access to computers, and more privileges than their outside counterparts. This paper wi...
Main Author: | |
---|---|
Language: | EN |
Published: |
Utica College
2015
|
Subjects: | |
Online Access: | http://pqdtopen.proquest.com/#viewpdf?dispub=1604807 |
id |
ndltd-PROQUEST-oai-pqdtoai.proquest.com-1604807 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-PROQUEST-oai-pqdtoai.proquest.com-16048072015-12-17T03:57:57Z The accessibility of insider threats on a corporate network Denison, Stephen Computer science <p> Corporations try to defend themselves against outsider threats, but insider threats can be just as devastating. Insiders have an understanding of their organization’s critical assets, physical access to computers, and more privileges than their outside counterparts. This paper will outline three different areas of accessibility issues that insiders can take advantage of in order to leak sensitive information; exfiltration methods, encryption, and corporate considerations of best practices. Data exfiltration focuses on the different techniques that insiders can use to transfer sensitive information. The research outlines how exfiltration has evolved into more sophisticated techniques, but concludes that rudimentary methods associated with external storage devices are still prominently used. Data encryption, if applied properly, can protect sensitive information from unauthorized access, but also creates problems that corporations will have to address. Work productivity can be halted by encryption techniques, causing employees to bypass these systems. Historical cyber attacks show that managing encryption keys are equally important as managing encrypted data, but encryption can still be dismantled through brute force attacks. Corporations will have to make decisions on which best practice methods to choose from in order to defend themselves against insider attacks. Some of these considerations include: risk assessments, employee training, monitoring, password management, data management, and BYOD considerations. Improper utilization of these practices can allow information to be stolen by insiders, but if applied properly, can mitigate the accessibility of insiders. Keywords: insider threats; data exfiltration; Cybersecurity; Professor Christopher Riddell; encryption.</p> Utica College 2015-12-11 00:00:00.0 thesis http://pqdtopen.proquest.com/#viewpdf?dispub=1604807 EN |
collection |
NDLTD |
language |
EN |
sources |
NDLTD |
topic |
Computer science |
spellingShingle |
Computer science Denison, Stephen The accessibility of insider threats on a corporate network |
description |
<p> Corporations try to defend themselves against outsider threats, but insider threats can be just as devastating. Insiders have an understanding of their organization’s critical assets, physical access to computers, and more privileges than their outside counterparts. This paper will outline three different areas of accessibility issues that insiders can take advantage of in order to leak sensitive information; exfiltration methods, encryption, and corporate considerations of best practices. Data exfiltration focuses on the different techniques that insiders can use to transfer sensitive information. The research outlines how exfiltration has evolved into more sophisticated techniques, but concludes that rudimentary methods associated with external storage devices are still prominently used. Data encryption, if applied properly, can protect sensitive information from unauthorized access, but also creates problems that corporations will have to address. Work productivity can be halted by encryption techniques, causing employees to bypass these systems. Historical cyber attacks show that managing encryption keys are equally important as managing encrypted data, but encryption can still be dismantled through brute force attacks. Corporations will have to make decisions on which best practice methods to choose from in order to defend themselves against insider attacks. Some of these considerations include: risk assessments, employee training, monitoring, password management, data management, and BYOD considerations. Improper utilization of these practices can allow information to be stolen by insiders, but if applied properly, can mitigate the accessibility of insiders. Keywords: insider threats; data exfiltration; Cybersecurity; Professor Christopher Riddell; encryption.</p> |
author |
Denison, Stephen |
author_facet |
Denison, Stephen |
author_sort |
Denison, Stephen |
title |
The accessibility of insider threats on a corporate network |
title_short |
The accessibility of insider threats on a corporate network |
title_full |
The accessibility of insider threats on a corporate network |
title_fullStr |
The accessibility of insider threats on a corporate network |
title_full_unstemmed |
The accessibility of insider threats on a corporate network |
title_sort |
accessibility of insider threats on a corporate network |
publisher |
Utica College |
publishDate |
2015 |
url |
http://pqdtopen.proquest.com/#viewpdf?dispub=1604807 |
work_keys_str_mv |
AT denisonstephen theaccessibilityofinsiderthreatsonacorporatenetwork AT denisonstephen accessibilityofinsiderthreatsonacorporatenetwork |
_version_ |
1718152956885336064 |