O'Reilly logo

Enemy at the Water Cooler by Brian T Contos

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

will continue to improve over time and the program will become better based
on best practices and lessons learned.
Once an insider is discovered, the detailed forensic investigation seeks to
determine how long the actions have been happening, who else may have
been involved, and the extent of the damage. Often, the damages are associ-
ated with specific business issues.
Insider Threats
from a Business Perspective
Insiders have access to more sensitive information, more easily than the unas-
sisted external cyber criminals. Some forms of damage that insiders can cause
from a business perspective are:
Loss of confidential data and intellectual property
Reduced data integrity
Exposed personal or private information
Damaged or destroyed critical information assets
Severed communications
Blocked sales
Such damage can result in:
Loss of customers
Decrease in competitive advantage (increase for competitors)
Loss of shareholder faith
Financial loss
Smeared reputations
Clearly none of these outcomes are positive, but an organization must
conduct business; it can’t simply lock up all its data in a vault. So what it
comes down to is evaluating risk. Most organizations won’t have the resources
to completely protect all servers, networks, desktops, mobile devices, and so
forth, but they can ensure that the most mission-critical systems, sensitive data,
www.syngress.com
62 Chapter 2 • Insider Threats
424_Wtr_Clr_02.qxd 7/26/06 4:14 PM Page 62

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required