官术网_书友最值得收藏!

Human threats

Human threats consist of inside attackers or outside attackers. Insiders can be employees, vendors, or contractors with privileged access to systems. They can also be organizations and outside attacks by non-employees or groups of inpiduals just looking to harm and disrupt an organization due to a motive or aim.

The most dangerous form of attackers are usually insiders, because they have access to the system and know security measures that are already in place. Insider attacks can be malicious or negligent and can also be accidental.

All companies in this world have to deal with employee work force reduction and expansion. Consequently, controlling and changing the permission on system assets is a very important action item. Lack of process and failure to remove access to sensitive assets for employees who no longer have a business requirement increase an asset's exposure to unauthorized access. This can be a common cause of insider attacks, which is often overlooked.

Since there is usually a trust between employee and employer, most employees are not out to harm them. However, there's no way to ensure that this is the case with all employees, so the best practice is to be cautious and take the appropriate measures to prevent inside threat.

Here is one classic example:

A company's important application was operated by the personal credentials of an employee who had been working there for many years. However, one day the company laid that employee off. The next day, the IS department deleted his credentials. The application then stopped working. An issue like this can cause major damage to a system, and it will definitely take time to identify and fix the problem.

Human security threats can be something as simple as a person opening an attachment loaded with malicious script or malware that opens the system's back door and allows outsiders to extract information. The worst-case scenario often isn't a hacker breaching internal systems, but an employee that loses his smartphone or has his laptop stolen. The best defense lies in securing the data, not just the devices. This means encrypting at the file-level, so confidential information is protected even it is stolen.

主站蜘蛛池模板: 鹤岗市| 双辽市| 洪泽县| 通化市| 环江| 岱山县| 腾冲县| 左权县| 郧西县| 比如县| 无极县| 祁连县| 扶余县| 漠河县| 普兰店市| 浦北县| 阳西县| 大悟县| 平塘县| 定结县| 汉阴县| 富平县| 城口县| 吉水县| 大连市| 吉林市| 繁峙县| 佛教| 定边县| 梁平县| 聊城市| 苗栗市| 鄢陵县| 托里县| 修武县| 墨竹工卡县| 昂仁县| 公安县| 同江市| 普格县| 石林|