The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)

著者

    • Cappelli, Dawn
    • Moore, Andrew
    • Trzeciak, Randall

書誌事項

The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)

Dawn Cappelli, Andrew Moore, Randall Trzeciak

(The SEI series in software engineering)

Addison-Wesley, c2012

  • : hbk.

タイトル別名

The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes theft, sabotage, fraud

大学図書館所蔵 件 / 1

この図書・雑誌をさがす

注記

Includes bibliographical references and index

内容説明・目次

内容説明

Since 2001, the CERT (R) Insider Threat Center at Carnegie Mellon University's Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT (R) Guide to Insider Threats describes CERT's findings in practical terms, offering specific guidance and countermeasures that can be immediately applied by executives, managers, security officers, and operational staff within any private, government, or military organization. The authors systematically address attacks by all types of malicious insiders, including current and former employees, contractors, business partners, outsourcers, and even cloud-computing vendors. They cover all major types of insider cyber crime: IT sabotage, intellectual property theft, and fraud. For each, they present a crime profile describing how the crime tends to evolve over time, as well as motivations, attack methods, organizational issues, and precursor warnings that could have helped the organization prevent the incident or detect it earlier. Beyond identifying crucial patterns of suspicious behavior, the authors present concrete defensive measures for protecting both systems and data. This book also conveys the big picture of the insider threat problem over time: the complex interactions and unintended consequences of existing policies, practices, technology, insider mindsets, and organizational culture. Most important, it offers actionable recommendations for the entire organization, from executive management and board members to IT, data owners, HR, and legal departments. With this book, you will find out how to Identify hidden signs of insider IT sabotage, theft of sensitive information, and fraud Recognize insider threats throughout the software development life cycle Use advanced threat controls to resist attacks by both technical and nontechnical insiders Increase the effectiveness of existing technical security tools by enhancing rules, configurations, and associated business processes Prepare for unusual insider attacks, including attacks linked to organized crime or the Internet underground By implementing this book's security practices, you will be incorporating protection mechanisms designed to resist the vast majority of malicious insider attacks.

目次

Preface xvii Acknowledgments xxxi Chapter 1: Overview 1 True Stories of Insider Attacks 3 The Expanding Complexity of Insider Threats 6 Breakdown of Cases in the Insider Threat Database 7 CERT's MERIT Models of Insider Threats 9 Overview of the CERT Insider Threat Center 13 Timeline of the CERT Program's Insider Threat Work. 16 Caveats about Our Work 20 Summary 20 Chapter 2: Insider IT Sabotage 23 General Patterns in Insider IT Sabotage Crimes 28 Mitigation Strategies 46 Summary 59 Chapter 3: Insider Theft of Intellectual Property 61 Impacts 66 General Patterns in Insider Theft of Intellectual Property Crimes 68 The Entitled Independent 69 The Ambitious Leader 78 Theft of IP inside the United States Involving Foreign Governments or Organizations 83 Mitigation Strategies for All Theft of Intellectual Property Cases 88 Mitigation Strategies: Final Thoughts 97 Summary 98 Chapter 4: Insider Fraud 101 General Patterns in Insider Fraud Crimes 106 Insider Fraud Involving Organized Crime 115 Organizational Issues of Concern and Potential Countermeasures 120 Mitigation Strategies: Final Thoughts 126 Summary 127 Chapter 5: Insider Threat Issues in the Software Development Life Cycle 129 Requirements and System Design Oversights 131 System Implementation, Deployment, and Maintenance Issues 136 Programming Techniques Used As an Insider Attack Tool 139 Mitigation Strategies 142 Summary 143 Chapter 6: Best Practices for the Prevention and Detection of Insider Threats 145 Summary of Practices 146 Practice 1: Consider Threats from Insiders and Business Partners in Enterprise-Wide Risk Assessments 151 Practice 2: Clearly Document and Consistently Enforce Policies and Controls 155 Practice 3: Institute Periodic Security Awareness Training for All Employees 159 Practice 4: Monitor and Respond to Suspicious or Disruptive Behavior, Beginning with the Hiring Process 164 Practice 5: Anticipate and Manage Negative Workplace Issues 168 Practice 6: Track and Secure the Physical Environment 171 Practice 7: Implement Strict Password- and Account-Management Policies and Practices 174 Practice 8: Enforce Separation of Duties and Least Privilege 178 Practice 9: Consider Insider Threats in the Software Development Life Cycle 182 Practice 10: Use Extra Caution with System Administrators and Technical or Privileged Users 187 Practice 11: Implement System Change Controls 191 Practice 12: Log, Monitor, and Audit Employee Online Actions 195 Practice 13: Use Layered Defense against Remote Attacks 200 Practice 14: Deactivate Computer Access Following Termination 203 Practice 15: Implement Secure Backup and Recovery Processes 207 Practice 16: Develop an Insider Incident Response Plan 211 Summary 213 References/Sources of Best Practices 214 Chapter 7: Technical Insider Threat Controls 215 Infrastructure of the Lab 217 Demonstrational Videos 218 High-Priority Mitigation Strategies 219 Control 1: Use of Snort to Detect Exfiltration of Credentials Using IRC 220 Control 2: Use of SiLK to Detect Exfiltration of Data Using VPN 221 Control 3: Use of a SIEM Signature to Detect Potential Precursors to Insider IT Sabotage 223 Control 4: Use of Centralized Logging to Detect Data Exfiltration during an Insider's Last Days of Employment 231 Insider Threat Exercises 239 Summary 239 Chapter 8: Case Examples 241 Sabotage Cases 241 Sabotage/Fraud Cases 256 Theft of IP Cases 258 Fraud Cases 262 Miscellaneous Cases 269 Summary 273 Chapter 9: Conclusion and Miscellaneous Issues 275 Insider Threat from Trusted Business Partners 275 Malicious Insiders with Ties to the Internet Underground 286 Final Summary 293 Appendix A: Insider Threat Center Products and Services 299 Appendix B: Deeper Dive into the Data 307 Appendix C: CyberSecurity Watch Survey 319 Appendix D: Insider Threat Database Structure 325 Appendix E: Insider Threat Training Simulation: MERIT InterActive 333 Appendix F: System Dynamics Background 345 Glossary of Terms 351 References 359 About the Authors 365 Index 369

「Nielsen BookData」 より

関連文献: 1件中  1-1を表示

詳細情報

ページトップへ