INTERNAL
RISKS and THREATS see also witiger.com/ecommerce/ThirdPartyRisksOutsourcing.htm see also witiger.com/ecommerce/ThirdPartyRisks.htm |
. | This page
used in the following courses taught by Prof. Richardson
.
|
Sources
of Internal Threats |
. | Basically, you
can divide Internal Threats into 3 basic sub-categories
|
Sources
of Internal Threats |
. | Existing
Employees
|
Sources
of Internal Threats Accidents |
. | Existing
Employees
George Said
|
Sources
of Internal Threats Accidents |
. | George says
the story was carried on Yahoo
yahoo.com/s/ap/20070320/ap_on_re_us/lost_data (link not working in 2013) George added
|
Internal
Threats - employees - growing? |
. | There are differences
of opinion as to whether Internal Threats caused by Employees is a growing
percentage, or declining percentage of the threats facing companies in
the new millenium.
Greenstein suggests threat by employees is becoming less than external threat Other people suggest that the economic pressures of competitiveness and globalization are forcing more and more companies to intensify their productivity which means more work out of less people. People being stressed to do more work means employees in situations where they are less happy about the company and the work environment and more prone to take some action which would be a threat to the companies operations. |
Internal
Threats - employees |
. |
AP reported "Stealing trade secrets is not uncommon in a competitive corporate culture where heavy premiums are placed on bringing an innovative new product or technology to market first. Joya Williams is accused of stealing confidential documents and a sample of a new Coke while working as an administrative assistant to the company's global brand director." |
Sources
of Internal Threats |
. | Former Employees
|
Sources
of Internal Threats |
. | Former Employees
Threaten Network Security
is the title of an article By Sharon Gaudin http://itmanagement.earthweb.com/career/article.php/3595456 Gaudin says
(searches of articles in 2010 and 2015 seem to hover around the percentage of 60-70 percent of breaches caused by insiders)
|
Sources
of Internal Threats |
. | Employees
of Third Parties
see also witiger.com/ecommerce/ThirdPartyRisks.htm As the global Competitive Environment becomes more intense and as the Economic Environment further encourages companies to cut costs, enterprises are increasingly sourcing simpler functions to 3rd party entities - many of these in developing countries. The main reason for outsourcing
is to cut costs.
An example in the early years of Y2K in Canada involved a bank executive who picked a low priced IT outsourcing firm to dispose of old PCs, and the outsourcing firm fails to wipe the hard drives - thereby allowing people who obtained this used equipment, to access bank customer info. This raises the possibility that an identity theft situation could be committed against you even if you never bank online - your vulnerability could be through the banks records which end up being released to a 3rd party entity, which in turn has a leak. |
Internal
Risk - example |
, |
"Bank Fraud Trail leads to former Outsourcing Help" This story discussed how former workers at EDS stole money from account holders of the CSB Canada Savings Bond program. In writing this story, Guzman interviewed Joe Greene, Ottawa-based vice-president of IT security research for IDC Canada. www.idc.ca Greene said "Corporate IT security is not just about protecting against external attacks like worms and viruses, but it's also about recognizing the potential of internal threats... you can have the best firewalls in the world, but if you let your guard down internally, you're still going to get burned". |
In the
class FSM 620 E-Business Opportunities: Financial Industry @ Seneca College,
students
|
witiger.com/powerpoints/IT~security/InternalRiskandthreats2007.ppt
link still works in March 2014 |
in a group presentation in April 2007 made a PowerPoint Presentation with some of the points noted in this unit + some additional information. This unit can be viewed by clicking on the link above |
see
also "the problem of 'internal negligence' http://www.computerworld.com.au/article/427471/security_threats_explained_internal_negligence/
|
CONTACT I MAIN PAGE I NEWS GALLERY I E-BIZ SHORTCUTS I INT'L BIZ SHORTCUTS I MKTG&BUSINESS SHORTCUTS I TEACHING SCHEDULE |
. | |
MISTAKES ITEXTS USED I IMAGES I RANK IDISCLAIMER I STUDENT CONTRIBUTORS I FORMER STUDENTS I | |
. |