Page 26 - Cyber Warnings
P. 26
The information sharing methods
By Milica D. Djekic
The information could be shared through many different means and right here we would discuss
how they can leak out from some organization using insider’s threat sources. The insider’s
threats are those people within your business who are willing to release the confidential
information to some criminal or terrorist network being present outside.
They may spy on the rest of the enterprise or even steal some valuable objects from there and
take them out to their contacts. Through this article, we would analyze which methods of
information sharing are most typical to a modern business environment.
Right here we would mention how information could be stolen from some organization. It’s
important to know that in case of cyberspace operation – there could be used a plenty of social
engineering tactics. So, the methods are as follows:
The e-mail correspondence: Many confidential information could get stolen and
forwarded to an external threat using the email accounts. This method could get
classified as quite old-fashioned, because the majority of Police Forces are trained to
confirm that communication line.
In order to trick the authorities, the threats would use their private accounts and try to
appear as peaceful as possible at their work. Luckily, even those cases are resolvable
to the majority of Police Forces.
The Skype communication: The majority of critical information could leak out through
the Skype messenger. The insider’s threat could use his private Skype account or add a
private contact to the Skype for a business. It’s clear that during the working hours
being spent in the office – the staff is obligated to get online in sense of the Skype’s
communication, so it’s logical that the insider’s threat would simply add the private
contact on. This scenario is well-known to the authorities, so it’s not that hard to resolve
such a case.
The Darknet communication: The professional threats would usually maintain their
communication and do information exchange using some of the Darknet systems. It’s
not a rare case that the threat would create several Darknet accounts in order to make
the investigation being much harder to the authorities. Also, the security challenges
would use fake identities and so commonly share the information through Darknet e-
mails, chat services, forums, discussion groups and so on. We believe that modern
authorities can cope even with this scenario, because it’s something we would meet in a
practice so often.
26 Cyber Warnings E-Magazine – March 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide