欢迎来到三一文库! | 帮助中心 三一文库31doc.com 一个上传文档投稿赚钱的网站
三一文库
全部分类
  • 研究报告>
  • 工作总结>
  • 合同范本>
  • 心得体会>
  • 工作报告>
  • 党团相关>
  • 幼儿/小学教育>
  • 高等教育>
  • 经济/贸易/财会>
  • 建筑/环境>
  • 金融/证券>
  • 医学/心理学>
  • ImageVerifierCode 换一换
    首页 三一文库 > 资源分类 > PPT文档下载  

    ADiscussionoftheInsiderThreat.ppt

    • 资源ID:2036775       资源大小:322.51KB        全文页数:11页
    • 资源格式: PPT        下载积分:4
    快捷下载 游客一键下载
    会员登录下载
    微信登录下载
    三方登录下载: 微信开放平台登录 QQ登录   微博登录  
    二维码
    微信扫一扫登录
    下载资源需要4
    邮箱/手机:
    温馨提示:
    用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)
    支付方式: 支付宝    微信支付   
    验证码:   换一换

    加入VIP免费专享
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    ADiscussionoftheInsiderThreat.ppt

    A Discussion of the Insider Threat,Jason Franklin,Inside,Outside,Example Insider Attack,Ivan the insider gets fired and Alf the administrator forgets to void Ivans (login) credentials. Ivan goes home, logins into his work machine and takes some malicious action (introduces bugs into source, deletes files and backups, etc) Alternatively, Alf might void Ivans credentials, but forget that Ivan also uses a shared group account.,Proposed Definition,A malicious insider is an adversary who operates inside the trusted computing base, basically a trusted adversary. The insider threat is an adversarial model encompassing all possible malicious insiders.,Ivan,Example Threats,Data corruption, deletion, and modification Leaking sensitive data Denial of service attacks Blackmail Theft of corporate data On and on.,Statistics,Insider attacks account for as much as 80% of all computer and Internet related crimes 1 70% of attacks causing at least $20,000 of damage are the direct result of malicious insiders 1 Majority of insiders are privileged users and majority of attacks are launched from remote machines 3,Problem Discussion,Typical adversarial models ignore the insider threat by assuming the TCB is free of threats Insider threat violates this assumption,Corporate Network,Firewall/IDS,Prevailing Sentiments (Myths?),Current systems are capable of countering the insider threat Insider threat is impossible to counter because of the insiders resources and access permissions Insider attacks are a social or organizational issue which cannot be countered by technical means (Anderson94),Remediation: Initial Thoughts,Minimize the size of the TCB to decrease the number of possible insiders Distribute trust amongst multiple parties to force collusion Most insiders act alone Question trust assumptions made in computing systems Treat the LAN like the WAN BroLAN, SANE, etc Others?,Is the insider threat unavoidable?,If we define an insider as an adversary inside the TCB, can we ever eliminate the insider threat? Perhaps we can only reduce the number of possible insiders or the extent of possible damage? Perhaps we should rely on the “lone wolf” nature of insiders and distribute trust?,Discussion,Is the insider threat definition a good one? Is the insider an actual threat or just media hype? Can/do we build systems that already counter the insider threat? Is this worth our time? Whats the best paper you could imagine in this area?,References,1 Jim Carr. Strategies and issues: Thwarting insider attacks, 2002. 2 Nathan Einwechter. The enemy inside the gates: Preventing and detecting insider attacks, 2002. 3 National Threat Assessment Center - Insider Threat Study, http:/www.ustreas.gov/usss/ntac_its.shtml 4 Jason Franklin, Parisa Tabriz, and Matthew Thomas. A Case Study of the Insider Threat through Modifications to Legacy Network Security Architectures, unpublished manuscript.,

    注意事项

    本文(ADiscussionoftheInsiderThreat.ppt)为本站会员(本田雅阁)主动上传,三一文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知三一文库(点击联系客服),我们立即给予删除!

    温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




    经营许可证编号:宁ICP备18001539号-1

    三一文库
    收起
    展开