Beware the Inside Job
Our networks are under attack. Most intruders aren't terrorists or hackers, more likely, they sit next to you in the lunchroom, and may even share your cubicle. Right now, these malicious insiders could be invisibly attacking from the inside via the corpYour data is extremely important to you, and it may be even more valuable to someone else! While it may be hard to accept, digital espionage launched through an intranet is statistically the most common mode of attack. It is also the most costly, and the least defended. The assets of the corporate intranet are real targets. The information it contains would be damaging if it were available to anyone outside, and even needs to be shielded from most internal users. This includes marketing plans, customer data, personnel records and financial results. Despite the security requirements, the servers containing this data need to be accessible from multiple places within, and outside your organization, and via existing wiring. Well outline the current problems, and show how traditional security measures cannot prevent internal intrusion. We will also identify an effective intrusion prevention strategy, with alternatives for implementation.
The Problem by Example - Events of 2002:
- A software firm loses key talent when news of a layoff spreads after the CEOs mail is compromised.
- A CFO signs an affidavit that that no one can get unauthorized advance access to financial results, and then he must explain to the SEC how a trusted associate made a suspicious, highly profitable transaction.
- A college discovers massive classroom grade changes in its servers.
- A tabloid gets personal medical data on a celebrity from a hospital and prints it
- A virus bypasses the perimeter gateway to attack one server in a data center then instantly infects hundreds more peer systems inside.