Podcast
Questions and Answers
What did Chelsea Manning leak to the public?
What did Chelsea Manning leak to the public?
Who is Edward Snowden?
Who is Edward Snowden?
Former NSA employee who disclosed secret NSA documents to the media.
XKeyscore allows unchecked access to any email.
XKeyscore allows unchecked access to any email.
False
What is the Insider Threat Study [Moore07] about?
What is the Insider Threat Study [Moore07] about?
Signup and view all the answers
Define Personal Predisposition.
Define Personal Predisposition.
Signup and view all the answers
Unmet expectations can lead to insider IT sabotage.
Unmet expectations can lead to insider IT sabotage.
Signup and view all the answers
What contributes to the likelihood of insider IT sabotage?
What contributes to the likelihood of insider IT sabotage?
Signup and view all the answers
Observable actions that precede malicious insider activity are known as ______.
Observable actions that precede malicious insider activity are known as ______.
Signup and view all the answers
What is a Technical Precursor?
What is a Technical Precursor?
Signup and view all the answers
What are Unknown Access Paths?
What are Unknown Access Paths?
Signup and view all the answers
A lack of controls can facilitate IT sabotage.
A lack of controls can facilitate IT sabotage.
Signup and view all the answers
What are Business Dynamics Notations?
What are Business Dynamics Notations?
Signup and view all the answers
How can insider threats be addressed?
How can insider threats be addressed?
Signup and view all the answers
Study Notes
Chelsea Manning
- Leaked approximately 500,000 army reports and 250,000 US diplomatic cables.
- Stored classified documents on a CD, copied them to a MacBook, and transmitted to Wikileaks.
Edward Snowden
- Former NSA contractor who disclosed secret agency documents to the media.
- As of November 2013, The Guardian reported having published only 1% of the leaked information.
XKeyscore
- Tool enabling the NSA to read anyone's email if the email address was known.
- NSA asserts that unchecked access to this tool does not exist.
Insider Threat Study [Moore07]
- Analyzed 150 insider cyber crimes, focusing on detailed modeling of 30 cases.
- Seven key observations for insider IT sabotage include:
- Personal predisposition
- Unmet expectations
- Stressful events
- Behavioral precursors
- Technical precursors
- Unknown access paths
- Lack of controls
Personal Predisposition
- Insiders often had existing characteristics tied to a tendency for malicious behavior.
Unmet Expectations
- Disgruntlement stemming from unmet work-related expectations often led to IT sabotage.
Stressful Events
- High-stress situations increased the likelihood of insider IT sabotage occurring.
Behavioral Precursors
- Actions or conditions observable before malicious insider activities serve as indicators of potential threats.
Technical Precursors
- Organizations frequently overlook individual actions or conditions involving technology related to insider threats, such as password sharing or persistent system access.
Unknown Access Paths
- Insiders may exploit hidden access paths to unauthorized systems, like creating backdoors.
Lack of Controls
- Insufficient physical and electronic controls can enable IT sabotage activities.
Business Dynamics Notations
- Visual representation of the seven observations: solid arrows indicate positive influence, while dashed arrows indicate negative influence.
- Balancing loops drive organizational variables toward stability, while reinforcing loops lead to consistent upward or downward trends.
How to Address Insider Threats
- Mitigation strategies include setting clear expectations, proactive handling of disgruntlement, targeted monitoring, closing unknown access paths, and implementing measures upon employee demotion or termination.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Explore key figures in security insider threats with these flashcards. Learn about notable cases such as Chelsea Manning and Edward Snowden, who revealed critical information about classified documents to the public. This quiz is perfect for those interested in cybersecurity and intelligence.