Network Security Breach From the Internal staff Members Abstract

advertisement
School of Information Systems, Curtin University of Technology, Western Australia
Network Security Breach
From the Internal staff Members
Prepared by: Sanyoto Gondodiyoto1
Abstract
Enterprises spend millions to protect themselves from the threat of computer sabotage/breach.
Internal staff member is one the potential or can be suspected to be part of the breach problem.
Based on the experience (at least by Bank Central Asia, Indonesia), 70 % of network security
breach is because of procedural aspect. 30% of the attacks are partly technical aspects, such as
the information systems infrastructure, security tools. On the other hand, BCA statistic
represents that 62% was internal attacks and 38% was (1996, when BCA used the intranet),
and after using internet 41% to 59% (2000), and 30% to 70% (2001). Auditing, management
controls and awareness are key points as security building blocks.
1. General Overview
Genuity Inc. had conducted survey throughout 1997 and 1998. Genuity Inc.
(http://www.genuity.com, 2002) mailed surveys to several thousand corporate executives
to learn more about their organizations' preparedness with respect to network security.
The purpose was to gain a preliminary understanding of the relative importance of
Internet security, and to determine the degree of readiness to detect and repel any breach
or attempted breach of network security. During the research, recipients were asked to
register their degree of agreement/disagreement with statements on Internet security,
concerning to:
•
The Internet security policy is critical to business success.
•
The company has a well-defined, complete, and documented Internet security
policy that provides appropriate protection against unauthorized access.
•
The Internet security solution is monitored 24 hours a day, seven days a week,
by competent security experts to assure that any hostile activity is detected and
stopped.
Based on survey conducted by Genuity Inc. (http://www.genuity.com, 2002)
among the key findings are an overwhelming 90% of respondents in the survey agreeing
that Internet security is critical to business success. However, despite strong processes
Drs. Sanyoto Gondodiyoto, SE., Mcomm., Mkom., MMSI., Akuntan
in place, gaping holes still exist, only 33% of responding organizations have a
continuous security monitoring and only 29% routinely assess the financial implications
of a security breach. Computer Security Institute (CSI) and the Federal Bureau of
Investigation (FBI) conducted another research. According to the respected CSI and
FBI Computer Crime and Security Survey on 2002, unauthorized access and misuse of
web resources has grown significantly over the past few years.
2. Breach by Internal Staff
Digital Research Inc., an independent market research company based in
Kennebunk, also had conducted research regarding network security breaches.
According to Digital (webmaster@digitalresearch.com, 2002), one in four survey
participants noted that their company’s network has ever had a breach of security.
Respondents representing companies with 50 or more employees were more likely to
report that a network security breach had occurred. Among those who reported a
network security breach was users accessing resources they shouldn’t be entitled to,
accounts left open after employee has left the company.
Types of security breaches (n=122)
Users accessing resources they shouldn’t be entitled to 57%
Accounts left open after employee has left company 43%
Been the victim of information theft from your network 30%
Access to contractors not terminated upon project completion 27%
Attempted or successful break-in by angry employee 21%
3. The Typical Scenario
Based on Digital Research Inc. research, attempted or successful break-in by
angry employee is about 21%. Indeed, breaches by an internal staff member is one of
the most illegal but very difficult to anticipate breaches. The internal staff members are
assuming familiar with the business model and the computer configuration (may be
including the security and protection mechanism). Firewall used only to protect the
network from external attacks. The internal staff member or ex-staff member may attack
the systems because of several reasons, for example the un-happy staff member (or ex-
1
Sanyoto Gondodiyoto (12455702), student of Curtin University of Technology.
staff member), or no compliance operation. On the other hand it is possible that they
break the systems only by accident, or because of incompetence situation.
Another situation concerning the breaches by internal staff members are:
•
The introverted style of Information Technology staff.
•
The frustrated situation in a project activity, or because of an overloaded.
•
Trust too much to information technology staff so that he or she has the
possibility to conduct a breach.
•
No clear security policy in a company or organization.
•
Password or IDs that are not deleted for ex-staff member.
•
The management controls or the internal audit is not effective.
According to Digital (webmaster@digitalresearch.com, 2002), with the Internet
and mobile working playing increasingly important roles in business, connecting to
internal systems is becoming far easier. But that fact rings true for society’s more
malicious elements as well as trustworthy staff members. More than ever, security is
now about keeping information safe while allowing maximum flexibility for employees.
4. Learn from Empiric Internal Breaches
Liestyo (Liestyo, 2002), Head of Consumer Banking Division of the Bank
Central Asia, on a security seminar conducted in Jakarta June 25, 2002, stated:
•
In today’s security systems: the network is open, customer have access to
information for copying, forwarding, traveling to systems (the users are all
the customers).
•
The potential attack, based on BCA experience, are: burglars, braking the
ATM, fooling the ATM, virus/Trojan horse, mirroring eBanking Site,
hacking, employees attacking other sites, and insider attacks.
•
The statistic of the attacks categorized internal and external are 62% to 38%
(1996, when BCA used the intranet), and after using Internet 41% to 59%
(2000), and 30% to 70% (2001).
•
70% of attacks are mostly procedural (security policy & procedures,
information technology policy, un-efficient auditing, low risk management).
30% of the attacks are partly technical aspects, such as the information
systems infrastructure, security tools.
•
Internal staff members (the insider) are one the most potential security
attacks, or at least helping the others to conduct breach.
Internal auditing (quality assurance, surprised audit, audit trails, independent
•
verification) is one the security building blocks for secure e-Commerce
transactions.
Vigilinx Digital Security Solutions Coy. (www.gidancesoftware.com, 2002), the
world leader in providing forensic and enterprise investigation solutions, stated, “Make
sure that you have audit trails in place internally and are able to carry out some form of
internal forensics. Inevitably (even with the best security money can buy) there will the
old breach, but learn from this. Find out what happened, how and why, and move to
ensure that similar breaches do not occur in future. Internal firewall, security gateways
that enforce network traffic policies between different regions of the corporate
network”.
Enterprise response, auditing and discovery solutions provide an integrated
platform to respond to enterprise incidents and threats provide the following benefits:
‰
Accelerate response time to information security breaches.
‰
Empower enterprises to better control corporate assets and infrastructure.
‰
Conduct comprehensive enterprise-wide data investigations and audits.
‰
Reduce the potential liability from misuse of corporate information and assets
‰
Eliminate costly and archaic investigation and auditing procedures
‰
Increase information systems’ reliability and availability by conducting
investigations while systems are online.
It’s no good having a policy or buying security software if it is not [well]
implemented. You need to continuously check that the software you bought is installed
and operating correctly and that the policies you set are being followed. It helps if you
can automate these checks. Computer Associates TM adds that prevention is better than
a cure. Any security strategy must be carried out in layers, with solutions used to
compliment others, e.g. intrusion detection is a good back up for the firewall, in case
anybody is able to breach that level (as inevitably they will if they try hard enough).
Some of the universal dos/don’ts that govern us are:
‰
The road block, or, “do not all eggs in one basket”.
‰
The reactionary, or, shutting the gate once the horse has bolted
‰
The patchwork quilts, or divide and fall. Myth, if you buy the best security
products on the market then you is less likely to suffer a security breach.
‰
The Plate Spinner, or, too much to manage. The key to effective security is vision,
the ability to monitor all areas simultaneously, set up alerts to irregular activity.
‰
The Agoraphobic, or, too paranoid about what’s outside. Fear of external threats is
understandable, but that’s no reason to put all your effort into fending off the wolf
at your door. Most accidents happen in the home; internal users or ex-staff commits
by far the majority of security breaches. A recent Meta report highlighted that, over
the lifecycle of an employee, he or she has 17 user Ids, however, when employees
leave only eleven user Ids are ever deleted.
5. Conclusion
The Internet security policy is critical to business success. However, only 33%
of responding organizations have a continuous security monitoring. Many reasons of
breaches from the insider such as the introverted style of IT staffs, the frustrated
situation in a project activity, overloaded jobs, trust too much to IT staff, no clear
security policy in a company or organization, password or IDs that are not deleted for
ex-staff member, the management controls & awareness or the internal audit is not
effective.
REFERENCES/BIBLIOGRAPHY
Baum M. S, and Ford W. (2001). Secure Electronic Commerce, Second Edition. New
Jersey: Prentice Hall Inc.
Davis G.B. (1993). Management Information Systems: Conceptual Foundations,
Structure and Development, Edisi Bahasa Indonesia. Jakarta: PT. Pustaka
Binaman Pressindo,
Laudon, K., C. and Laudon, J., P. (1995). Management Information Systems
Organization and Technology, 5-Edition. New Jersey: McGraw Hill Inc.
Liestyo S. (2002). Head of Consumer Banking Division, Bank Central Asia, Jakarta.
Information Security in Banking. Jakarta: June, 25, 2002.
Schwalbe, Kathy. (2002). Information Technology Project Management, Second
Edition. Course Technology, Thompson Learning.
http://www.comm.toronto.edu
http://www.wirelessethernet.org
http://alpha.fdu.edu/kanoksri/IEEE80211b.html
http://www.entrepreneur.com
http://www.oleran.com/security.htm
http://www.vigilinx.com
http://www.vigilinx.com
http://www.echelonsystems.com
http://www.digitalresearch.com
http://www.guidancesoftware.com
Reference Material:
1. Mainebiz
August 20, 2001 (Reprinted with permission)
Private Matters
Survey says: When it comes to issues of network privacy and security, small firms just
might have a lot to learn from their bigger cousins.
The following are excerpts from a market research rerport on new work security and privacy, conducted
for Sloane & Co. by Kennebunk-based Digital Research, Inc. The results are based on 548 completed
online surveys among a sampling of eWEEK magazine subscribers.
On policies and procedures:
•
One in two respondents reported that their companies have a formal written policy for maintaining
the privacy of information on their network server.
Do They Have Privacy Policy? (n=548)
Yes, formal written policy 54%
Yes, informal internal policy 26%
No privacy policy 15%
Don’t know/Not sure 4%
•
Respondents representing companies with revenues of $500 million or greater were the most likely to
have a formal written policy (87%).
•
The proportion of companies with formal internal policies for maintaining the privacy of information
stored on their networks increases based on the number of employees.
Frequency of privacy policies by company size
Under 50 employees 33%
50 to 499 employees 49%
500 to 4,999 employees 69%
5,000 or more employees 78%
•
Eight in ten respondents reported that their company has established password policies and
procedures. Companies with 50 or more employees were more likely to have established password
policies and procedures.
Do companies have established password polices and procedures?
Yes, have established password policies and procedures
Total Sample (n=548) 83%
Under 50 Employees (n=171) 73%
50 or more Employees (n=365) 88%
No established password policies and procedures
Total Sample (n=548) 15%
Under 50 Employees (n=171) 25%
50 or more Employees (n=365) 10%
Don’t know/Not sure
Total Sample (n=548) 1%
Under 50 Employees (n=171) 1%
50 or more Employees (n=365) 1%
Regarding network security and privacy issues:
Survey participants were asked to indicate how concerned they were about several issues
involving network security and privacy at their company. The options were very concerned, somewhat
concerned, not concerned and no opinion.
•
Among the network security and privacy issues that respondents were asked to evaluate, survey
participants were most concerned about outsiders gaining access to sensitive information by hacking
into our system.
•
Participants were least concerned about insiders having access to more files than they actually need.
What network privacy and security issues are business people concerned about?
Outsiders gaining access to sensitive information by hacking into your
system:
Very Concerned 55%
Somewhat Concerned 32%
Not Concerned 12%
No Opinion 0%
Inappropriate insiders having access to sensitive data residing on your
file servers:
Very Concerned 40%
Somewhat Concerned 37%
Not Concerned 22%
No Opinion 1%
Competitors gaining access to private financial information or strategic
plans:
Very Concerned 40%
Somewhat Concerned 25%
Not Concerned 32%
No Opinion 2%
Insiders having access to more files than they actually need:
Very Concerned 26%
Somewhat Concerned 50%
Not Concerned 24%
No Opinion 0%
The participants’ role in the security decision-making process affected their level of
concern:
Outsiders gaining access to sensitive information by hacking into your system:
Involved in Process (n=473) 57%
Not Involved in Process (n=73) 48%
Inappropriate insiders access to sensitive data residing on your file servers:
Involved in Process (n=473) 41%
Not Involved in Process (n=73) 33%
More participants from small companies indicated they were not concerned about
network and privacy security issues:
Insiders having access to more files than they actually need:
Total Sample (n=548) 24%
Fewer than 10 Employees (n=84) 42%
Inappropriate insiders access to sensitive data residing on your file
servers:
Total Sample (n=548) 22%
Fewer than 10 Employees (n=84) 35%
Regarding network security breaches:
One in four survey participants noted that their company’s computer network has ever had a
breach of security. Respondents representing companies with 50 or more employees were more likely to
report that a network security breach had occurred.
Have you had a network security breach?
Yes
Total Sample (n=548) 22%
Under 50 Employees (n=171) 10%
50 or more Employees (n=365) 28%
No, Not aware of any
Total Sample (n=548) 66%
Under 50 Employees (n=171) 82%
50 or more Employees (n=365) 59%
Don’t know/Not sure
Total Sample (n=548) 10%
Under 50 Employees (n=171) 8%
50 or more Employees (n=365) 10%
•
Among those who reported a network security breach (122 respondents), the most frequently
mentioned breach was users accessing resources they shouldn’t be entitled to.
•
Another frequently mentioned breach is accounts left open after employee has left the company.
Types of security breaches (n=122)
Users accessing resources they shouldn’t be entitled to 57%
Accounts left open after employee has left company 43%
Been the victim of information theft from your network 30%
Access to contractors not terminated upon project completion 27%
Attempted or successful break-in by angry employee 21%
•
Among survey participants reporting security breaches, three in five reported from 1 to 3 such
breaches occurring during the past 12 months.
Frequency of security breaches in the last year (n=122)
None 16%
1 to 3 61%
4 to 6 11%
7 to 9 2%
10 or more 10%
•
Among companies with fewer than 50 employees reporting a security breach (very small sub-sample
of 17 respondents), 88% reported from 1 to 3 network security breaches in the past 12 months. There
was no mention of anything above three security breaches by companies with fewer than 50
employees.
Digital Research, Inc. is an independent market research company based in Kennebunk.
home | company | services | clients | panel | contact | privacy pledge
©2001 Digital Research, Inc.
201 Lafayette Center, Kennebunk, ME 04043 USA
webmaster@digitalresearch.com
Managed Security Readiness Report
Background
Throughout 1997 and 1998, Genuity mailed surveys to several thousand corporate
executives to learn more about their organizations' preparedness with respect to network
security. The purpose was to gain a preliminary understanding of the relative importance of
Internet security, and to deter-mine the degree of readiness to detect and repel any breach or
attempted breach of network security.
Recipients were asked to register their degree of agreement/disagreement with each of
seven different statements on Internet security:
•
Statement #1:
Internet security policy is critical to our business success.
•
Statement #2:
Our company has a well-defined, complete, and documented Internet security policy
that provides appropriate protection against unauthorized access.
•
Statement #3:
I am confident that every change to our Internet security solution has been documented
and reviewed by our IT management and systems administration staff, prior to
implementation.
•
Statement #4:
I am confident that our administrative staff is aware of and current with all known
security alerts and advisories that may impact our Internet security quality.
•
Statement #5:
We routinely assess the financial impact resulting from a compromise of our Internet
security.
•
Statement #6:
Our Internet security solution is monitored 24 hours a day, seven days a week, by
competent security experts to assure that any hostile activity is detected and stopped.
•
Statement #7:
I consider an intranet to be a possible component of our internal information
infrastructure.
The survey was conducted in three "waves". Wave One was completed in June 1997. A second
Wave was conducted and compiled in November 1997. The third Wave was completed in May
1998. Separated by only a few months, the different results highlight the important trends and
rapid changes occurring in the Internet market in general and Internet security in particular.
Key Findings
An overwhelming majority of organizations continue to recognize the critical nature of
communica-tions and applications. An overwhelming 90% of respondents in Wave Two of the
survey agree that Internet security is critical to business success.
Despite the near-unanimous consensus regarding the importance of Internet security, 43% of
respon-ders (up from 38%) were confident that their organizations were current with and aware
of all known threats that can affect secure protection and prevent unauthorized access to their
data assets.
Companies are moving swiftly to define and implement documented policies and procedures for
securing their Internet. The number has now soared to more than 72%.
However, despite strong processes in place, gaping holes still exist. Only 33% of responding
organizations have a continuous 24 hour a day, seven days a week security monitoring.
Only 29% routinely assess the financial implications of a security breach.
Commentary
Those companies that are most concerned with network perimeter security are those that are
engaged in commercial business enterprises and are most concerned about the financial (losses
resulting from a security compromise), legal (liability resulting from a security breach), or
confidentiality issues at risk. They know a security breach can happen at any time and know the
value of security plans, policies, management, and 24 x 7 monitoring.
For secure communications to occur, more and more companies have concluded that protection,
detection, and rapid-intervention measures must be implemented. This approach is fine as long
as organizations do not rely too heavily on detection and reaction and pay too little attention to
protection. PDR is used by DISA for U.S. Government security. Firewalls are only a first line of
defense that must be actively managed by trained security personnel in order to be effective.
Both managed perimeter and internal security coverage that employ trained security
professionals are now today's requirement in order to detect, repel, and respond to external and
internal security threats.
Contact Us | Legal | Acceptable Use Policy | Privacy Policy | 1-800-GENUITY
Copyright © 2002 Genuity Inc. All rights reserved.
Internal Audit
Our Audit Team will perform an exhaustive audit of your site security, internal systems and security policies. The audit seeks to expose
key vulnerabilities in your security posture at various levels of privileged access.
Echelon Audit Teams are highly skilled security professionals who have many years of hands-on experience testing corporate security.
These advanced teams are capable of testing physical, internal and Internet systems.
Results and recommendations are presented to your IT staff following the audit. Team members are available to advise clients on
security architecture matters.
Audit Scope
Site Security
Assessment
A Penetration Team will attempt to physically breach your site security and collect sensitive data which
may assist in breaching your network security and data systems. This assessment attempts to expose the
level of security awareness in your staff and facilities.
Zero Privilege
Vulnerability
Assessment
Your security posture is assessed from the "zero privilege" standpoint. We will perform a vulnerability
assessment of internal systems and data assuming network access is available without an authorized
logon. We use "zero-knowledge" techniques to map and exploit network and system vulnerabilities from
the inside similar to those a cracker might use.
User Privilege
Vulnerability
Assessment
We now assume a basic level of privilege has been obtained through exploits of previously discovered
vulnerabilities. Many vulnerabilities allowing high privilege levels are exposed only once some level of
privilege is attained.
This assessment is particularly important as it assesses vulnerabilities available to those with a limited
privilege level.
Administrative Privilege This audit focuses on the vulnerabilities available with higher levels of privileged access. We assume this
privilege level was attained through exploitation of lower level vulnerabilities or through social engineering.
Vulnerability
Since in most systems today there is little protection from the administrator this audit focuses on
Assessment
determining the scope of exposure resulting from attainment of administrative privilege levels.
Configuration Audits
Applications
•
•
•
•
desktop images (95/NT/2k)
•
•
•
•
•
•
public network
email (virus & attachments)
application servers
SQL services (ACL)
Infrastructure
Recommendations
remote connectivity
internet access (outbound)
security policy
best practices
Analyze penetration attempts and recommend corrective actions.
•
•
•
•
•
•
Price
private network
upgrades
patches
configurations
site security
security policy
design review
Price is variable based on complexity of network and number of systems. Contact us for more information.
Internal Audit
Our Audit Team will perform an exhaustive audit of your site security, internal systems and security policies. The audit seeks to expose
key vulnerabilities in your security posture at various levels of privileged access.
Echelon Audit Teams are highly skilled security professionals who have many years of hands-on experience testing corporate security.
These advanced teams are capable of testing physical, internal and Internet systems.
Results and recommendations are presented to your IT staff following the audit. Team members are available to advise clients on
security architecture matters.
Audit Scope
Site Security
Assessment
A Penetration Team will attempt to physically breach your site security and collect sensitive data which may
assist in breaching your network security and data systems. This assessment attempts to expose the level
of security awareness in your staff and facilities.
Zero Privilege
Vulnerability
Assessment
Your security posture is assessed from the "zero privilege" standpoint. We will perform a vulnerability
assessment of internal systems and data assuming network access is available without an authorized logon.
We use "zero-knowledge" techniques to map and exploit network and system vulnerabilities from the inside
similar to those a cracker might use.
User Privilege
Vulnerability
Assessment
We now assume a basic level of privilege has been obtained through exploits of previously discovered
vulnerabilities. Many vulnerabilities allowing high privilege levels are exposed only once some level of
privilege is attained.
This assessment is particularly important as it assesses vulnerabilities available to those with a limited
privilege level.
Administrative Privilege This audit focuses on the vulnerabilities available with higher levels of privileged access. We assume this
Vulnerability
privilege level was attained through exploitation of lower level vulnerabilities or through social engineering.
Assessment
Since in most systems today there is little protection from the administrator this audit focuses on determining
the scope of exposure resulting from attainment of administrative privilege levels.
Configuration Audits
Applications
Infrastructure
Recommendations
•
desktop images (95/NT/2k)
•
•
•
email (virus & attachments)
•
•
•
•
•
•
public network
SQL services (ACL)
private network
remote connectivity
Internet access (outbound)
security policy
best practices
Analyze penetration attempts and recommend corrective actions.
•
•
•
•
•
•
Price
application servers
upgrades
patches
configurations
site security
security policy
design review
Price is variable based on complexity of network and number of systems. Contact us for more information.
External Audit
Penetration Team engagements are controlled exercises designed to expose potential vulnerabilities resulting from a breach of external
network security.
The Penetration Team operates on a "zero-knowledge" basis, utilizing techniques similar to those a cracker might employ to maximize
his ability to "own" your systems.
Our Penetration Teams are highly skilled security professionals who have many years of hands-on experience testing corporate security.
These advanced teams are capable of testing physical, internal and Internet systems.
Results and recommendations are presented to your IT staff in a briefing session following the engagement. Team members are
available to advise clients on security architecture matters.
The team results are captured in a document and presented to your IT staff in a briefing session following the engagement. Team
members are available to advise clients on security architecture matters.
Penetration Methodology
Reconnaissance
Identifies visible hosts, routers, ISPs, and more from public sources using automated tools and human
expertise.
Target Profiling
Develops a detailed picture of each device identified during reconnaissance. This includes operating system
fingerprinting, software/hardware version and other information.
Vulnerability Mapping
Uses information from the target profile to map known vulnerabilities to individual host.
Target Selection
Selects the ?softest? host through creation of penetration plans for each host.
Host Penetration
Executes the penetration plans) for each host using series of exploits with proprietary and publicly available
tools.
Recommendations
Analyzes penetration attempts and makes corrective recommendations.
Price
Price is variable based on complexity of network and number of systems. Average pricing is $25,000 for a
yearly subscription which includes quarterly vulnerability assessments.
Please contact us for more information.
REFERENCES
1. The Best Time to Implement Network Security Plans - ... vulnerabilities
with Hacking Exposed: Network ... a costly struggle to have internal ... in
entrepreneurial companies where staff ... of just one security breach. ...
http://www.entrepreneur.com/Your_Business/YB_SegArticle/0,4621,300432,00.html
2. OLERAN :: Net Solutions - ... security expertise necessary to manage security
on your Internet network ... most frequent point of breach ... engineer works with your
internal staff ...
http://www.oleran.com/security.htm
3. Genuity-Managed Security-Readiness Reports - ... confident that our
administrative staff ... possible component of our internal ... financial implications of a
security breach ... are most concerned with network ...
http://www.genuity.com/services/security/sitepatrol/readiness.htm
4. Network Security Consulting Services (PDF) - ... of a potential security
breach. ... Our security staff will examine ... A well designed security infrastruc ...
DMZ) a computer or network ... the Internet and your internal ...
http://www.unisys.com/common/investors/brochures/Security_Network_Security_Con
sulting_41359506 000.pdf
5. slip sheets (PDF) - ... ports and services * Auditing internal ... Routine security
maintenance by staff ... any type of security breach ... vendor completes a full
security ... on the client's network ...
http://www.macroint.com/css/SamplePrice.pdf
6. 3101 Sec Arch Des (PDF) - ... confidential communications throughout a global
network ... transactions * Incorporate input from internal staff ... there has been a
security breach ...
http://www.vigilinx.com/pdf/SecArchDes.pdf
7. Avatier: Command Your Greatest Asset - ... secure, self service password
reset; Make your internal staff ... REDUCE THREAT OF SECURITY BREACH ... from
breaking into an organization’s network ...
http://www.avatier.com/solutions/verticals/media.htm search within this site
8. Echelon Systems Inc. - Systems that Work! - ... will attempt to physically
breach ... awareness in your staff ... Vulnerability Assessment, Your security ...
vulnerability assessment of internal ... and data assuming network ...
http://www.echelonsystems.com/security.htm
9. Hacker penetrates NY Times' network - Tech News - CNET.com - ... NY
Times' network By Robert Lemos and Margaret Kane Staff ... giant confirmed that the
security of the internal network of ... The security breach is ...
http://news.com.com/2100-1023-846215.html search within this site
10. Madison Gurkha Technology Think-Tank - ... to reduce networking,
operational, and staff ... modem entry points to its internal ... (more...); Network and
System ... Services After a possible security breach ...
http://www.madison-gurkha.com/serv_security.shtml
11. Reaction Remedies - the way it should work (PDF) - ... elements as well as
trustworthy staff ... Where the network is concerned, however ... on this form of
security. ... to be alerted when a breach ... data open to both internal ...
http://www.cai.com/offices/uk/press/aug02/security.pdf search within this site
12. Digital Research, Inc. : Company : News - ... The proportion of companies with
formal internal policies for maintaining ... employees were more likely to report that a
network security breach ...
http://www.digitalresearch.com/digitalresearch/company/art_08202001.html
13. CITY IT & The e.forum - Financial Services 2002 | Conference ... - ... are
relatively sanguine and a security breach ... Better levels of internal network security
were ... Another example was what levels of security ... Internal staff ...
http://www.cityit.co.uk/conference/ttsession.asp?Ref=secure
14. UCD Directives - ... Upon detecting a security breach, the NOC shall ... and
actions and will develop written internal ... The staff had no policy to ... The Permanent
Network Security ...
http://chancellor.ucdavis.edu/Resource/direct/1999/99-016.cfm
15. Intranet Security using Active Net Steward, the Distributed ... - ... that
have suffered a breach ... Internal and external security requirements can ... policy
(identifying breaches of policy, staff ... Computer and Network Security, ...
http://www.online-edge.co.uk/distributed-firewall.html
16. www.activis.com - News Articles - Enemy Within - ... New research shows
that network ... to important business information, internal ... staff, contractors and
staff ... minded hackers can even breach company security ...
http://www.activis.com/en/news/articles/individual_articles/enemy_within.html
17. When the Walls Fall Down: (PDF) - ... steps should be taken when internal staff ...
enterprises can benefit from powerful, network ... 90% of respondents detected
security ... as the result of a breach ...
http://www.guidancesoftware.com/support/downloads/eeewhitepaper.pdf search within
this site
18. InformationWeek > Behind The Numbers > Defenses Mount Against ... ... or more have made the internal ... that admitted to a security breach ... Former
staff members are more ... to be behind a security ... Create Wireless Public-Safety
Network 08 ...
http://www.informationweek.com/story/IWK20020703S0028 search within this site
19. Escrow Consulting Ltd - ... The Full Breach Security Assessment will assist ...
Internal Network/Computer system Vulnerabilities Danger of staff accessing data they
...
http://www.escrowconsulting.com/services/full.html
20. Security Assessments - ... your management and technical staff ... telnet activity;
Remote management; Internal ... detrimental effects of a security breach ... an
understanding of your network ...
http://www.shake.net/assessments.cfm search within this site
Download