1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

IDG Contributor Network: Anatomy of an insider attack

Discussion in 'CSO' started by RSS, Sep 29, 2016.

  1. RSS

    RSS New Member Member

    Insider threats are often addressed in blogs, articles, and books. But it isn’t always easy to tell the story to business leaders and their employees. An episode of one of my favorite shows included a character taking steps any employee can complete in an unprepared organization. Let’s run through the plot (a good scenario for management) and then take a look at what would have prevented each step in the attack.

    The attack


    Chris was tasked by an external attacker, one who had leverage over her, to steal legal documents related to a civil action. The attacker—we’ll call him Bill—provided Chris with a USB drive loaded with malware. The malware was designed to extract login information from a target system.

    To read this article in full or to leave a comment, please click here

    Continue reading...
     

Share This Page