Insider Attack Essay

Improved Essays
Although in today’s media we hear a plethora of reports regarding hackers and attacks on government agencies, multi-million dollar organizations and small business; it’s rarely brought to our attention that many compromises are made possible by insider threats. Without a doubt it is instantly assumed that a majority of insider attacks are intentional; however, it’s the unintentional insider threats that pose a bigger danger to security. Why is the unintentional insider threat a bigger threat? Because more than likely, the user is unaware they are the threat and/or are not well trained and are more likely to repeat their poor security habits. Also research has shown working long hours and multitasking are red flags for risk” ("Survey Finds Employee …show more content…
As with red teaming, these techniques are designed to help debias thinking, enhance decision making, and avoid surprise. According to Fishbein and Treverton, “alternative analysis seeks to help analysts and policy-makers stretch their thinking through structured techniques that challenge underlying assumptions and broaden the range of possible outcomes considered.” They further clarify the term by specifying that “Alternative analysis includes techniques to challenge analytic assumptions (e.g. ‘devil’s advocacy’), and those to expand the range of possible outcomes considered (e.g. ‘what-if analysis,’ and ‘alternative scenarios’).” Despite their many potential advantages, red teaming and alternative analysis are not silver bullets. As one would expect, the quality of the output hinges inter alia on the quality and experience of the team, the team’s approach and toolset, and the overall context of the effort. An overconfident or culturally biased analyst or team will not benefit as much from these approaches as might an analyst or team that employs “actively open-minded thinking,” to use Jonathan Baron’s term. (See, for example, his book Thinking and

Related Documents

  • Great Essays

    1.0 Introduction 1.1 Authorisation and purpose This report is authorised by Dr Gregory Nash, Course Coordinator University of the Sunshine Coast, Queensland. The purpose of this report is to fulfil the report writing task for COR 109 Communication and Thought, at the University of the Sunshine Coast, Queensland, Australia. 1.2 Limitations This report is limited to the three interpersonal communication skills of listening, feedback and questioning and does not enlighten any other interpersonal communication skills.…

    • 1094 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Opening Statement Written policies provide a means of security within organization. It establishes the regulations that all faculty must adhere to in order to protect important company and client information. The organizational policies should be read by and signed by each employee as a consensus that all regulations will be followed once joining the organization. And, for those who are current employees, to keep abreast of any amendments made to current policy, so that all employees are in compliance. These policies should be kept in an accessible place for everyone to read, so no one will be left out of the loop.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The assignment is to collect and analyze collected data from a chosen organization to identify one or more its training needs. The recommendation should be justified and linked to the company’s business goals. The Training Needs Assessment (TNA) is used to determine if training is the proper corrective measure to a performance problem. For this assignment I have chosen the Cracker Barrel restaurant chain. It is necessary to follow a systematic approach in order to design an effective training process.…

    • 1481 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    In 2014 hosts downloaded malware every 6 minutes In 2014 hosts accessed a malicious site every 24 seconds Corporate Data at Risk When mobile security is weak, it can provide attackers with personal information, passwords, business and personal email, corporate documents, and access to company networks and applications. In the business setting, that concern becomes magnified. In fact, 87 percent of IT professionals say careless employees are a greater threat to security than cybercriminals. And, 92 percent say employee behaviors could have made a difference in preventing high-profile security…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Our recommendation to the National Security Council is to pursue Policy #4, using a honeynet to trap attackers and provide attribution. This technical solution is far more covert than our other alternative policies. It allows us to obtain knowledge about hackers’ methods and means of attack during their attempts to infiltrating sensitive data. Most importantly, it could potentially provide irrefutable evidence for attribution. This evidence enables the US to impose harsher sanctions without fear of a backlash.…

    • 381 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Dod Insider Threats

    • 1065 Words
    • 5 Pages

    Failure of counterintelligence analysis has led to leaks and exposures of numerous classified materials/missions. Insider threats come from individuals who operate inside friendly intelligence and national security organizations who purposefully set out to cause disruption, destruction, and commit crimes to those ends. Every member working within the Intelligence Community must remain vigilant for indicators of an insider threat in their work centers. As well as family members and friends as well. According to the DoD Insider Threat Mitigation Report, an " insider is anyone who is or has been authorized access to a DoD information system, whether a military member, a DoD civilian employee, or employee of another Federal agency or the private…

    • 1065 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    2. Generation of alternative strategies. This involves reflection on past actions, resources, and considering alternative (D’Zurilla and Nezu, 2007). 3. Decision making.…

    • 482 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Critical Lens Essay

    • 650 Words
    • 3 Pages

    Cognitive and perceptual biases are inherent in everyone, including intelligence analysts. These biases are largely the result of training and experience. These biases form a personal lens through with intelligence analysts view information, analyze, and draw conclusions. “These [personal lenses] strongly influence what information analysts will accept – that is, data that are in accordance with analysts’ unconscious mental models are more likely to be perceived and remembered than information that is at odds with them” (Central Intelligence Agency, 2009, p. 1). The mental lenses that intelligence analysts develop are reinforced over time through experience and through training when it supports common historical analytical processes.…

    • 650 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Hate Crime Essay

    • 1011 Words
    • 5 Pages

    Journal November 15 –– Summarize the last 10 years (2005 – 2014) regarding hate crime victims, victimization, bias motivation and crime type. Does this information surprise you? Why, or why not? After accessing and viewing the report on hate crime in California I discovered a graph conducted by the U.S. Department of Justice illustrating the statistics of disclosed hate crime incidents from 2005 to 2014. The chart lists some of the listed categories of hate crimes including: Race, ethnicity, national origin, religion, sexual orientation, disability and gender.…

    • 1011 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Using the Defense Security Service Insider Threat Risk Equation Where, Risk = (threat, vulnerabilities, values, or consequence), I propose the Risk of Russian insider threats has grown substantially, that US citizens, many with DoD security clearance access, maintain radicalized or adverse political beliefs favorable to Russia. Our vulnerabilities range from poor personnel vetting to all aspects of information and systems security, and DoD facilities security. Lastly, the values of these insider threats, threaten damage to the U.S. interests through possible espionage, terrorism, mission failure and a degradation of DoD resources and capabilities or other adverse consequences.…

    • 922 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Redundancy

    • 319 Words
    • 2 Pages

    The reformation in the intelligence community to adapt the diversity of different area, and its effect on the redundancy. The group thinking and methods of reporting in the intelligence community are reforming to be more adaptable and open to new challenges. The analytic reporting and narrative reporting to the commanders and leaders in the same subject can convoy a different outcome. Depending on the costumer of the intelligence community, some customers looking for tactical analytic reports rather than long-term analyses. The strategic thinking and reporting can be produce a lot of positive redundancy, and helps in making decisions in strategic level and disseminate to operational and tactical level, depending on the region and style of operation.…

    • 319 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Essay On Overt Attack

    • 474 Words
    • 2 Pages

    The planning of and emergency response to a terror attack has always been a great concern. The main focus has always been on those of overt attack. These attacks are those by chemical, biological, or radiological/nuclear weapons. These type of attacks cause an immediate response from police, fire, and Emergency Medical Services personnel CDC Strategic Planning Workgroup, 2000; Forest& Howard, 2013). In any attack it is the state and the local government that will have the responsibility for the management and planning of responses to these attacks.…

    • 474 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Hurtful Bystander Essay

    • 832 Words
    • 4 Pages

    Another kind of hurtful bystander is someone who encourages the bully by reacting positively to their actions, like laughing, cheering, or shouting encouragement (Education Development Center, 2008). This kind of bystander is also a bully. By encouraging it to happen, they are participating in the bullying. The more bystanders who do this, the worse it gets. Bystanders who do this should be held to the same standards as the bully when it comes to punishment, because their actions are equally bad.…

    • 832 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    Some hackers are harmless, however some are prepared to wreak havoc on America. As our country becomes more and more dependent on technology and computers in everyday life, technology also becomes an important tool for potential terrorist organizations. These organizations can cause critical damage to information systems used by our government. Cyber terrorism is a relatively new word that refers to terrorist organizations or individuals who seek to damage and destroy technological infrastructures such as the Internet (Furnell & Warren, 1998, 1). According to Mark M. Pollit, “the modern thief can steal more with a computer than with a gun” (Pollit, 2007, 65).…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    When studies on cyber security and cyber attacks combined with the all too real fact that the general public is mal-informed as to their responsibility to become educated in cyber security awareness, a correlation exists (Fiedler, 2016). Being unaware of the serious consequences of the actions of individuals and businesses alike is what cyber security awareness is all about. Furthermore, in line with the disruptive innovation theory, the more advanced the technology, the greater opportunity to protect our businesses and individuals…

    • 2302 Words
    • 10 Pages
    Great Essays