ADiscussionoftheInsiderThreat.ppt

上传人:本田雅阁 文档编号:2036775 上传时间:2019-02-07 格式:PPT 页数:11 大小:322.51KB
返回 下载 相关 举报
ADiscussionoftheInsiderThreat.ppt_第1页
第1页 / 共11页
ADiscussionoftheInsiderThreat.ppt_第2页
第2页 / 共11页
ADiscussionoftheInsiderThreat.ppt_第3页
第3页 / 共11页
亲,该文档总共11页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

《ADiscussionoftheInsiderThreat.ppt》由会员分享,可在线阅读,更多相关《ADiscussionoftheInsiderThreat.ppt(11页珍藏版)》请在三一文库上搜索。

1、A Discussion of the Insider Threat,Jason Franklin,Inside,Outside,Example Insider Attack,Ivan the insider gets fired and Alf the administrator forgets to void Ivans (login) credentials. Ivan goes home, logins into his work machine and takes some malicious action (introduces bugs into source, deletes

2、files and backups, etc) Alternatively, Alf might void Ivans credentials, but forget that Ivan also uses a shared group account.,Proposed Definition,A malicious insider is an adversary who operates inside the trusted computing base, basically a trusted adversary. The insider threat is an adversarial

3、model encompassing all possible malicious insiders.,Ivan,Example Threats,Data corruption, deletion, and modification Leaking sensitive data Denial of service attacks Blackmail Theft of corporate data On and on.,Statistics,Insider attacks account for as much as 80% of all computer and Internet relate

4、d crimes 1 70% of attacks causing at least $20,000 of damage are the direct result of malicious insiders 1 Majority of insiders are privileged users and majority of attacks are launched from remote machines 3,Problem Discussion,Typical adversarial models ignore the insider threat by assuming the TCB

5、 is free of threats Insider threat violates this assumption,Corporate Network,Firewall/IDS,Prevailing Sentiments (Myths?),Current systems are capable of countering the insider threat Insider threat is impossible to counter because of the insiders resources and access permissions Insider attacks are

6、a social or organizational issue which cannot be countered by technical means (Anderson94),Remediation: Initial Thoughts,Minimize the size of the TCB to decrease the number of possible insiders Distribute trust amongst multiple parties to force collusion Most insiders act alone Question trust assump

7、tions made in computing systems Treat the LAN like the WAN BroLAN, SANE, etc Others?,Is the insider threat unavoidable?,If we define an insider as an adversary inside the TCB, can we ever eliminate the insider threat? Perhaps we can only reduce the number of possible insiders or the extent of possib

8、le damage? Perhaps we should rely on the “lone wolf” nature of insiders and distribute trust?,Discussion,Is the insider threat definition a good one? Is the insider an actual threat or just media hype? Can/do we build systems that already counter the insider threat? Is this worth our time? Whats the

9、 best paper you could imagine in this area?,References,1 Jim Carr. Strategies and issues: Thwarting insider attacks, 2002. 2 Nathan Einwechter. The enemy inside the gates: Preventing and detecting insider attacks, 2002. 3 National Threat Assessment Center - Insider Threat Study, http:/www.ustreas.gov/usss/ntac_its.shtml 4 Jason Franklin, Parisa Tabriz, and Matthew Thomas. A Case Study of the Insider Threat through Modifications to Legacy Network Security Architectures, unpublished manuscript.,

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 其他


经营许可证编号:宁ICP备18001539号-1