官术网_书友最值得收藏!

  • Practical Network Scanning
  • Ajay Singh Chauhan
  • 360字
  • 2022-07-12 10:43:03

Human threats

Human threats consist of inside attackers or outside attackers. Insiders can be employees, vendors, or contractors with privileged access to systems. They can also be organizations and outside attacks by non-employees or groups of inpiduals just looking to harm and disrupt an organization due to a motive or aim.

The most dangerous form of attackers are usually insiders, because they have access to the system and know security measures that are already in place. Insider attacks can be malicious or negligent and can also be accidental.

All companies in this world have to deal with employee work force reduction and expansion. Consequently, controlling and changing the permission on system assets is a very important action item. Lack of process and failure to remove access to sensitive assets for employees who no longer have a business requirement increase an asset's exposure to unauthorized access. This can be a common cause of insider attacks, which is often overlooked.

Since there is usually a trust between employee and employer, most employees are not out to harm them. However, there's no way to ensure that this is the case with all employees, so the best practice is to be cautious and take the appropriate measures to prevent inside threat.

Here is one classic example:

A company's important application was operated by the personal credentials of an employee who had been working there for many years. However, one day the company laid that employee off. The next day, the IS department deleted his credentials. The application then stopped working. An issue like this can cause major damage to a system, and it will definitely take time to identify and fix the problem.

Human security threats can be something as simple as a person opening an attachment loaded with malicious script or malware that opens the system's back door and allows outsiders to extract information. The worst-case scenario often isn't a hacker breaching internal systems, but an employee that loses his smartphone or has his laptop stolen. The best defense lies in securing the data, not just the devices. This means encrypting at the file-level, so confidential information is protected even it is stolen.

主站蜘蛛池模板: 濮阳县| 湖北省| 静海县| 那坡县| 固始县| 霍邱县| 绥芬河市| 内乡县| 安塞县| 天水市| 沁水县| 阿瓦提县| 宝坻区| 崇仁县| 灵川县| 绥芬河市| 普陀区| 宣威市| 彰武县| 洛宁县| 乡城县| 北碚区| 永胜县| 祁东县| 华宁县| 宜君县| 太和县| 巩留县| 新民市| 杂多县| 麻江县| 南靖县| 贵溪市| 大冶市| 康马县| 河北省| 峡江县| 安徽省| 郓城县| 盱眙县| 开鲁县|