The accessibility of insider threats on a corporate network

<p> Corporations try to defend themselves against outsider threats, but insider threats can be just as devastating. Insiders have an understanding of their organization&rsquo;s critical assets, physical access to computers, and more privileges than their outside counterparts. This paper wi...

Full description

Bibliographic Details
Main Author: Denison, Stephen
Language:EN
Published: Utica College 2015
Subjects:
Online Access:http://pqdtopen.proquest.com/#viewpdf?dispub=1604807
id ndltd-PROQUEST-oai-pqdtoai.proquest.com-1604807
record_format oai_dc
spelling ndltd-PROQUEST-oai-pqdtoai.proquest.com-16048072015-12-17T03:57:57Z The accessibility of insider threats on a corporate network Denison, Stephen Computer science <p> Corporations try to defend themselves against outsider threats, but insider threats can be just as devastating. Insiders have an understanding of their organization&rsquo;s critical assets, physical access to computers, and more privileges than their outside counterparts. This paper will outline three different areas of accessibility issues that insiders can take advantage of in order to leak sensitive information; exfiltration methods, encryption, and corporate considerations of best practices. Data exfiltration focuses on the different techniques that insiders can use to transfer sensitive information. The research outlines how exfiltration has evolved into more sophisticated techniques, but concludes that rudimentary methods associated with external storage devices are still prominently used. Data encryption, if applied properly, can protect sensitive information from unauthorized access, but also creates problems that corporations will have to address. Work productivity can be halted by encryption techniques, causing employees to bypass these systems. Historical cyber attacks show that managing encryption keys are equally important as managing encrypted data, but encryption can still be dismantled through brute force attacks. Corporations will have to make decisions on which best practice methods to choose from in order to defend themselves against insider attacks. Some of these considerations include: risk assessments, employee training, monitoring, password management, data management, and BYOD considerations. Improper utilization of these practices can allow information to be stolen by insiders, but if applied properly, can mitigate the accessibility of insiders. Keywords: insider threats; data exfiltration; Cybersecurity; Professor Christopher Riddell; encryption.</p> Utica College 2015-12-11 00:00:00.0 thesis http://pqdtopen.proquest.com/#viewpdf?dispub=1604807 EN
collection NDLTD
language EN
sources NDLTD
topic Computer science
spellingShingle Computer science
Denison, Stephen
The accessibility of insider threats on a corporate network
description <p> Corporations try to defend themselves against outsider threats, but insider threats can be just as devastating. Insiders have an understanding of their organization&rsquo;s critical assets, physical access to computers, and more privileges than their outside counterparts. This paper will outline three different areas of accessibility issues that insiders can take advantage of in order to leak sensitive information; exfiltration methods, encryption, and corporate considerations of best practices. Data exfiltration focuses on the different techniques that insiders can use to transfer sensitive information. The research outlines how exfiltration has evolved into more sophisticated techniques, but concludes that rudimentary methods associated with external storage devices are still prominently used. Data encryption, if applied properly, can protect sensitive information from unauthorized access, but also creates problems that corporations will have to address. Work productivity can be halted by encryption techniques, causing employees to bypass these systems. Historical cyber attacks show that managing encryption keys are equally important as managing encrypted data, but encryption can still be dismantled through brute force attacks. Corporations will have to make decisions on which best practice methods to choose from in order to defend themselves against insider attacks. Some of these considerations include: risk assessments, employee training, monitoring, password management, data management, and BYOD considerations. Improper utilization of these practices can allow information to be stolen by insiders, but if applied properly, can mitigate the accessibility of insiders. Keywords: insider threats; data exfiltration; Cybersecurity; Professor Christopher Riddell; encryption.</p>
author Denison, Stephen
author_facet Denison, Stephen
author_sort Denison, Stephen
title The accessibility of insider threats on a corporate network
title_short The accessibility of insider threats on a corporate network
title_full The accessibility of insider threats on a corporate network
title_fullStr The accessibility of insider threats on a corporate network
title_full_unstemmed The accessibility of insider threats on a corporate network
title_sort accessibility of insider threats on a corporate network
publisher Utica College
publishDate 2015
url http://pqdtopen.proquest.com/#viewpdf?dispub=1604807
work_keys_str_mv AT denisonstephen theaccessibilityofinsiderthreatsonacorporatenetwork
AT denisonstephen accessibilityofinsiderthreatsonacorporatenetwork
_version_ 1718152956885336064