The Insider Threat and Data Loss Prevention. CSCE 727. Agenda. Background The Insider Threat Examples in the news Data Loss Prevention Questions. The Insider Threat.
PowerPoint Slideshow about 'The Insider Threat and Data Loss Prevention' - yadid
An Image/Link below is provided (as is) to download presentation
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
An Insider Threat is a malicious threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization's security practices, data and computer systems. The threat may involve fraud, the theft of confidential or commercially valuable information, the theft of intellectual property, or the sabotage of computer systems.
Steven Medlock was a disbursement specialist for the State Department’s Global Financial Services Center, which handles worldwide billings and other transactions for the agency.
The U.S. Attorney’s Office said he created a sham company that submitted fake invoices to collect about $58,700 in currency-exchange fees from September 2011 to April 2012. He also forged an unidentified person’s name on payment vouchers as part of the embezzlement, prosecutors said.
A Charleston judge has sentenced a former U.S. State Department employee to probation and home detention for embezzling almost $59,000 from the federal government
Data loss prevention solution is a system that is designed to detect potential data breach / data ex-filtration transmissions and prevent them by monitoring, detecting and blocking sensitive data while in-use, in-motion, and at-rest. In data leakage incidents, sensitive data is disclosed to unauthorized personnel either by malicious intent or inadvertent mistake.
Such sensitive data can come in the form of private or company information, intellectual property, financial or patient information, credit-card data, and other information depending on the business and the industry.