Page 70 - Cyber Warnings
P. 70
It may seem surprising, but the below listed examples show that insider threats are becoming
really numerous and should be addressed in a proper way.
1) At a major US bank a contract janitor and two co-conspirators stole a number of customer
accounts and personally identifiable information from hard-copy documents. The criminals then
used the data to steal the identities of over 250 people: they opened credit cards, submitted
online change-of-address requests and, as a result, the victims did not get bank notifications
about fraudulent activities. That case cost the organization $200,000.
2) The UBS PainWebber incident shows that sometimes attackers don’t set a goal to steal data,
they just want to damage. The example is Roger Duronio who planted a “logic bomb” that
disabled 2,000 servers around the country in UBS PaineWebber offices. As result, the company
didn’t manage to make trades for several weeks and then reported to spend $3.1 million to
recuperate from the attacks.
3) An insider stole trade-secret drawings within his organization and sold them to a rival,
inflicting a $100-million loss. However, after losing a lawsuit, the company that received the
stolen documents was forced to declare bankruptcy.
Security and protection systems
One security professional is not able to cover the whole range of physical security, that’s why
it’s reasonable to plan a separate security program and address the 3 important components:
access control, surveillance, and training.
First, physical sites should be protected by fencing, locks, access control cards, biometric
access control systems, and fire suppression systems. Second, the company locations should
be monitored via surveillance cameras and different kinds of notification systems: physical
intrusion detection systems (IDSs), alarm systems, closed-circuit television (CCTV), heat
sensors and smoke detectors. Third, it’s indispensable to raise awareness among the
employees, delivering valuable info on disaster recovery policies, as well as on physical attacks
prevention and response procedures.
Security management software
Like in case of cyberattacks and intellectual capital protection, here an ideal variant is the
implementation of specific enterprise software to control and manage staff and guest access to
specific areas in a given physical facility to avoid insecure attendance.
To maintain such a complete control, the software is to include certain subsystems and
management tools:
1) Data Manager
The era of physical locks and keys has ended with no hope of a return. For now, electronic
access cards that interact with intelligently controlled devices represent one of the most secure
70 Cyber Warnings E-Magazine November 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide