The Danger From Within Summary

Superior Essays
“The State of Phishing Attacks” by Jason Hong provides an enlightening summary of the current state of phishing attacks. First, Hong defines and describes different types of phishing attacks. Second, he describes the motivations behind these attacks. Third, he notes how people create different attacks (e.g. fake phishing email, setting up fake websites, etc.) and he discusses the corresponding motives behind these types of attacks (e.g. using these tools to gain sensitive or confidential information from unsuspecting users). Fourth, Hong cites studies that shed light onto why people fall for phishing attacks. He paints the picture that human nature and human psychology are fallible in the face of expert criminals with advanced design tools …show more content…
That is a very creative way of describing the problem!
Review of: “The Danger From Within” by David M. Upton and Sadie Creese
In “The Danger From Within” by David M. Upton and Sadie Creese, the authors argue that internal attacks from insider threats are very common and much less appreciated than the cyber attacks that are prompted by external threats. Upton and Creese note that cyberattacks caused by insiders (such as employees, vendors, or anyone from any company that is connected to--or has access to--a firm’s computer system) are responsible for 20% of all cyberattacks (p. 5).
The authors argue that companies do not understand the magnitude of insider threats, nor do they take them seriously.
Additionally, the authors explain why and how insider threats are so pervasive and pernicious. They assert that there are three major reasons why insider threats have increased in the past few years. First, IT departments have increased in size and have become more intricate and complicated over time. Much of IT work is outsourced and there are not many mechanisms for accountability built into standard IT customer service departments. Second, employees using personal devices (anything from tablets and smartphones to flash drives) at work

Related Documents

  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3 Term Paper

    • 621 Words
    • 3 Pages

    Security Ecommerce site Phishing, “brand spoofing” or “carding”, is not a “pass-time” process but is a business-like on which organized crime groups extensively use and make a big deal of money. Phishing, being one of the most security challenges, is a hacking technique of malicious and fraudulent mass mailing, masquerade as emails from government agencies, business partners or even company executives using modern way such as social media, phone calls and any other communications to get access to usernames and passwords, credit cards or other sensitive information to steal valuable data. According to Anti-Phishing Working Group (APWG), an increase of 86% of phishing attacks in companies from 2013 to 2015 has been analyzed (source: Forbes).…

    • 621 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    “The first computer viruses hit computers in the early 1980s, and essentially we’ve been in a cyber-arms race ever since. We design new defenses, and then hackers and criminals design new ways to penetrate them….We’ve got to be just as fast and flexible and nimble in constantly evolving our defenses.” -President Barack Obam…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    DESPITE HIPPA’S HITECH ACT, CYBERATTACKS CONTINUE TO RISE HIPPA’s HITECH Act and the Omnibus rule were enacted to prevent data breaches in healthcare; however, healthcare data breaches are on the rise. Since its enactment in 1996, several provisions have been incorporated into the original Health Information Profitability and Accountability Act (HIPAA), one of which is the Health Information Technology for Economic and Clinical Health Act (HITECH): In 2009, The U.S. Department of Health and Human Services (HHS) enacted the American Recovery and Reinvestment Act, which includes the HITECH Act. On March 26,2013, HHS enacted a final Omnibus rule to implement several provisions of the HITECH Act. These provisions aim to strengthen the confidentiality…

    • 807 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Mensa IncStrategic plans are created at all three levels of an organization that include corporate, business, and functional levels of any organization which main purpose is to describe the objectives, goals, and also other plans necessary for accomplishing these goals. Finance, Marketing, Operations, and also Personnel are also important and should be measured when incorporating a strategic plan for any business. The Mensa Company has engaged itself with various businesses, which include Energy, Packaging, Forest Products, and also Financial Services. Each individual businesses and their sub-divisions should be required to appraise performance and also modify business strategies to ensure that increasing productivity is the main goal…

    • 1266 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Harrah Case Study

    • 1322 Words
    • 6 Pages

    Threats Harrah’s threats include regulatory pressures that can lead employees away from engaging too intimately with customers. Other threats include competitors’ ability to model bonus structures similarly which could impact the demand for talent and lucrativeness of the program. Finally, the gain sharing program is not tied to profitability so it could ultimately deter profits if program is paying out year over year due to goals being attain through customer service but not revenues.…

    • 1322 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Ailyn Chavira and Lucero Dominguez HealthSouth How do internal and external factors nurture the type of unethical behavior that has led to corporate scandals? In the case of HealthSouth they had both internal and external factors that lead to their issues with fraud. It's hard to believe that they never noticed the things that were slowly bringing them down but it's those sneaky things that can bring an entire company down.…

    • 862 Words
    • 4 Pages
    Decent Essays
  • Improved Essays

    Carry On is a good source of knowledge that gave deep information in the sense of security, it is a great help for readers who are in different fields other than information security. Bruce Schneier has very intimate knowledge about the topic of security. After reading the book we can find the vast information in different ways. The psychology of security is the chapter that is beautiful and meaningful and provides experimental information to the reader, Bruce relates the human mindset and human psychology with security as he tries to represent the similarity and difference with security and human psychology.…

    • 773 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Introduction Over the last few decades, American Society has rapidly changed due to the prompt development of advanced computer technology. These advancements continue to energize the next generation to push the boundaries of the possible, by challenging the impossible. Throughout the previous decades these boundaries have continued to be extended and defeated, impelling professionals to reanalyze what is truly impossible. However, due to the incredible pace in which these advancements are being achieved, international communities, like America, are left defending against threats and vulnerabilities that are unknown.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Additional factors that lead to illegitimate political behaviors are work place saboteurs such as co-workers who take credit for your hard work or blame you for their mistakes. One thing a person can do to protect themselves is to be ready for a confrontation with the backstabber. Many times someone gets away with this behavior because it can work for that person to get ahead. Backstabbers generally count on you not wanting to get in a confrontation so if you confront them they may back down and leave you alone. It would be beneficial to document any communication so you can defend yourself if the need arises.…

    • 196 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    The picture painted in our heads upon hearing these words may be those of Ted Bundy, Jack the Ripper, or H. H. Holmes, the notorious serial killers of the last two-hundred years. These people are seen as the fore front of killers and murderers, but in David M. Buss’s book, “The Murderer Next Door: Why the Mind is Designed to Kill”, he illustrates his new theory on how everyone, including you and I, are naturally hardwired to kill. This book, being one of 7 books published, represents his conclusions after what he claims was “the largest scientific study ever carried out on people’s homicidal fantasies”, going through 375 murders…

    • 1484 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Internal Validity Essay

    • 573 Words
    • 3 Pages

    Six Questions for Discussion 1. Can a researcher prove conclusively that a study has internal validity? Explain No. it is impossible to prove conclusively that a study has internal validity.…

    • 573 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    A true Enterprise Risk Management strategy is top priority for the leadership of the organization. In fact, failure to complete thorough risk assessment could put the organization in a state of emergency should the process be ignored or mismanaged (Fraser & Simkins, 2010). Ultimately, taking risk without weighing losses results in increased liability (Bethel, 2016). Thus, components of risk management include identifying the hazard, measuring the loss, and treating or responding to the event (Bethel, 2016).…

    • 817 Words
    • 4 Pages
    Improved Essays