ADiscussionoftheInsiderThreat.ppt
《ADiscussionoftheInsiderThreat.ppt》由会员分享,可在线阅读,更多相关《ADiscussionoftheInsiderThreat.ppt(11页珍藏版)》请在三一办公上搜索。
1、A Discussion of the Insider Threat,Jason Franklin,Inside,Outside,Example Insider Attack,Ivan the insider gets fired and Alf the administrator forgets to void Ivans(login)credentials.Ivan goes home,logins into his work machine and takes some malicious action(introduces bugs into source,deletes files
2、and backups,etc)Alternatively,Alf might void Ivans credentials,but forget that Ivan also uses a shared group account.,Proposed Definition,A malicious insider is an adversary who operates inside the trusted computing base,basically a trusted adversary.The insider threat is an adversarial model encomp
3、assing all possible malicious insiders.,Ivan,Example Threats,Data corruption,deletion,and modificationLeaking sensitive dataDenial of service attacksBlackmailTheft of corporate dataOn and on.,Statistics,Insider attacks account for as much as 80%of all computer and Internet related crimes 170%of atta
4、cks causing at least$20,000 of damage are the direct result of malicious insiders 1Majority of insiders are privileged users and majority of attacks are launched from remote machines 3,Problem Discussion,Typical adversarial models ignore the insider threat by assuming the TCB is free of threatsInsid
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ADiscussionoftheInsiderThreat
![提示](https://www.31ppt.com/images/bang_tan.gif)
链接地址:https://www.31ppt.com/p-5920242.html