• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

Insider Threats

September 18, 2016 by Loi Van Tran 2 Comments

A recent research provided from Imperva explained that one in every fifty employees is a malicious insider.  This reaffirms Gartner’s research that the insider is not just disgruntled employees leaving the organization.  Departing disgruntled leaving an organization is often anticipated, but the article warns that attention should also be rendered to current employees who sells information as a secondary source of income.

Impreva’s research, reviewed 140 security incidents and quizzed 250 UK based IT professionals which showed that these insider threats can have severe impacts on the organization.  These events include theft or dissemination of confidential data, indemnity theft, loss of productivity and damage to equipment and facilities.  The study showed that the biggest threat to enterprise security is the people that’s already on their payroll.

It also provides some mitigation and detecting techniques such as proper data classification, storage, and processes involving sensitive data.

Source: http://www.infosecurity-magazine.com/news/1-in-50-employees-a-malicious/

Filed Under: Uncategorized Tagged With:

Reader Interactions

Comments

  1. Ahmed A. Alkaysi says

    September 19, 2016 at 10:52 am

    Interesting article. At my company we deal with PII data. Employees aren’t allowed to bring any storage devices such as USB or external hard drives, The flow of information into and out of the company networks are being regularly monitored and we can’t send any attachments externally through email. If there is any PII data being sent in attachment in an email, it has to be thru SecureZip and a person needs to be able to login to view it.

    Log in to Reply
  2. Wade Mackey says

    September 20, 2016 at 1:29 am

    I don’t disagree with the point Imperva is making, but it is worth remembering that Imperva makes it’s living selling solutions for this space. From discussions I’ve had with Security and IT management, they as concerned about insert who just make a mistake as much or more then the malicious ones.

    Wade

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in