Human factors in information security: The insider threat - Who can you trust these days?
暂无分享,去创建一个
This paper examines some of the key issues relating to insider threats to information security and the nature of loyalty and betrayal in the context of organisational, cultural factors and changing economic and social factors. It is recognised that insiders pose security risks due to their legitimate access to facilities and information, knowledge of the organisation and the location of valuable assets. Insiders will know how to achieve the greatest impact whilst leaving little evidence. However, organisations may not have employed effective risk management regimes to deal with the speed and scale of change, for example the rise of outsourcing. Outsourcing can lead to the fragmentation of protection barriers and controls and increase the number of people treated as full time employees. Regional and cultural differences will manifest themselves in differing security threat and risk profiles. At the same time, the recession is causing significant individual (and organisational) uncertainty and may prompt an increase in abnormal behaviour in long-term employees and managers - those traditionally most trusted - including members of the security community. In this environment, how can organisations know who to trust and how to maintain this trust? The paper describes a practitioner's view of the issue and the approaches used by BT to assess and address insider threats and risks. Proactive measures need to be taken to mitigate against insider attacks rather than reactive measures after the event. A key priority is to include a focus on insiders within security risk assessments and compliance regimes. The application of technology alone will not provide solutions. Security controls need to be workable in a variety of environments and designed, implemented and maintained with people's behaviour in mind. Solutions need to be agile and build and maintain trust and secure relationships over time. This requires a focus on human factors, education and awareness and greater attention on the security 'aftercare' of employees and third parties.
[1] C. Colwill,et al. Dealing with the malicious insider , 2008 .
[2] The Congruence Model A Roadmap for Understanding Organizational Performance , 2004 .
[3] Paul Kearney,et al. Human vulnerabilities in security systems , 2007 .
[4] Edmund G. Archuleta,et al. National Infrastructure Advisory Council's Final Report and Recommendations on the Insider Threat to Critical Infrastructures , 2008 .