Security Insider Threats Flashcards
13 Questions
100 Views

Security Insider Threats Flashcards

Created by
@QuietRubidium

Questions and Answers

What did Chelsea Manning leak to the public?

  • Personal emails of government officials
  • NSA secret documents
  • Military operation plans
  • 500,000 army reports and 250,000 US diplomatic cables (correct)
  • Who is Edward Snowden?

    Former NSA employee who disclosed secret NSA documents to the media.

    XKeyscore allows unchecked access to any email.

    False

    What is the Insider Threat Study [Moore07] about?

    <p>Study of insider cyber crimes and modeling analysis of related cases.</p> Signup and view all the answers

    Define Personal Predisposition.

    <p>Previous condition or characteristic linked to malicious insider behavior.</p> Signup and view all the answers

    Unmet expectations can lead to insider IT sabotage.

    <p>True</p> Signup and view all the answers

    What contributes to the likelihood of insider IT sabotage?

    <p>Stressful events.</p> Signup and view all the answers

    Observable actions that precede malicious insider activity are known as ______.

    <p>Behavior Precursors</p> Signup and view all the answers

    What is a Technical Precursor?

    <p>An action or condition involving electronic media related to malicious activity.</p> Signup and view all the answers

    What are Unknown Access Paths?

    <p>Access paths unknown to management used by insiders to set up attacks.</p> Signup and view all the answers

    A lack of controls can facilitate IT sabotage.

    <p>True</p> Signup and view all the answers

    What are Business Dynamics Notations?

    <p>Graphical representation of the seven observations related to insider threats.</p> Signup and view all the answers

    How can insider threats be addressed?

    <p>Early mitigation, handling disgruntlement, targeted monitoring, and eliminating unknown access paths.</p> Signup and view all the answers

    Study Notes

    Chelsea Manning

    • Leaked approximately 500,000 army reports and 250,000 US diplomatic cables.
    • Stored classified documents on a CD, copied them to a MacBook, and transmitted to Wikileaks.

    Edward Snowden

    • Former NSA contractor who disclosed secret agency documents to the media.
    • As of November 2013, The Guardian reported having published only 1% of the leaked information.

    XKeyscore

    • Tool enabling the NSA to read anyone's email if the email address was known.
    • NSA asserts that unchecked access to this tool does not exist.

    Insider Threat Study [Moore07]

    • Analyzed 150 insider cyber crimes, focusing on detailed modeling of 30 cases.
    • Seven key observations for insider IT sabotage include:
      • Personal predisposition
      • Unmet expectations
      • Stressful events
      • Behavioral precursors
      • Technical precursors
      • Unknown access paths
      • Lack of controls

    Personal Predisposition

    • Insiders often had existing characteristics tied to a tendency for malicious behavior.

    Unmet Expectations

    • Disgruntlement stemming from unmet work-related expectations often led to IT sabotage.

    Stressful Events

    • High-stress situations increased the likelihood of insider IT sabotage occurring.

    Behavioral Precursors

    • Actions or conditions observable before malicious insider activities serve as indicators of potential threats.

    Technical Precursors

    • Organizations frequently overlook individual actions or conditions involving technology related to insider threats, such as password sharing or persistent system access.

    Unknown Access Paths

    • Insiders may exploit hidden access paths to unauthorized systems, like creating backdoors.

    Lack of Controls

    • Insufficient physical and electronic controls can enable IT sabotage activities.

    Business Dynamics Notations

    • Visual representation of the seven observations: solid arrows indicate positive influence, while dashed arrows indicate negative influence.
    • Balancing loops drive organizational variables toward stability, while reinforcing loops lead to consistent upward or downward trends.

    How to Address Insider Threats

    • Mitigation strategies include setting clear expectations, proactive handling of disgruntlement, targeted monitoring, closing unknown access paths, and implementing measures upon employee demotion or termination.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Explore key figures in security insider threats with these flashcards. Learn about notable cases such as Chelsea Manning and Edward Snowden, who revealed critical information about classified documents to the public. This quiz is perfect for those interested in cybersecurity and intelligence.

    More Quizzes Like This

    Use Quizgecko on...
    Browser
    Browser