Saturday, 3 May 2008

Insider Risk

The highest risk of insider attack generally occurs in organisations with an ineffectual internal security policy and procedure framework.

Wells (2004, p7) relates the “fraud triangle” to us for a model of corporate fraud. The risk of insider attack against computers and physical are similar and often one leads to the other. The three primary root-causes of internal attack; whether from computer-derived or other sources are thus;
1 Opportunity
2 Pressure
3 Rationalisation.

In any situation where more than one of these factors is allowed to grow unchecked, problems are likely to arise.

Attacks to an organisation instigated by external parties or hackers are difficult to categorise. This is a result of the difficulty in categorising hackers into a single taxonomy. The variety of methodologies, means and goals deployed and envisioned by these groups makes a simple classification difficult.

In general however, more attacks will occur and the more damaging where a level of due care is lacking. This is true both for internal and external attacks (Bosworth, Seymour & Kabay, 2002).

No comments: