Skip to main content

2015 | OriginalPaper | Buchkapitel

Pervasive Monitoring as an Insider Threat

An Adapted Model

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Revelations that the United States’ National Security Agency implemented a global surveillance programme with the help of its allies have drawn increased attention to pervasive monitoring activities in general. With the Internet Engineering Task Force characterising pervasive monitoring as an advanced persistent threat, the possibility of modelling pervasive monitoring as a threat activity has been raised. This paper proposes that pervasive monitoring can be considered an insider threat, with private or state actors using legitimate network functions and credentials to exfiltrate the data of governments, corporations, and end-users. The insider threat model put forth by Nurse et al. is examined and adapted with the help of pervasive monitoring case studies.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Hasan, R., Myagmar, S., Lee, A.J., Yurcik, W.: Toward a threat model for storage systems. In: Proceedings of the 2005 ACM Workshop on Storage Security and Survivability, pp. 94–102. ACM, New York (2005) Hasan, R., Myagmar, S., Lee, A.J., Yurcik, W.: Toward a threat model for storage systems. In: Proceedings of the 2005 ACM Workshop on Storage Security and Survivability, pp. 94–102. ACM, New York (2005)
3.
Zurück zum Zitat Johansson, J.M.: Network threat modeling. In: Proceedings of the Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. IEEE, New York, 9–11 June 2003 Johansson, J.M.: Network threat modeling. In: Proceedings of the Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. IEEE, New York, 9–11 June 2003
4.
Zurück zum Zitat Cappelli, D., Moore, A., Trzeciak, R.: The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud). Pearson Education Inc, New Jersey (2012) Cappelli, D., Moore, A., Trzeciak, R.: The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud). Pearson Education Inc, New Jersey (2012)
5.
Zurück zum Zitat Nurse, J.R.C., Buckley, O., Legg, P.A., Goldsmith, M., Creese, S., Wright, G.R.T., Whitty, M.: Understanding insider threat: a framework for characterising attacks. In: Workshop on Research for Insider Threat (WRIT), in Conjunction with the IEEE Symposium on Security and Privacy (SP). IEEE, New York, 18 May 2014 Nurse, J.R.C., Buckley, O., Legg, P.A., Goldsmith, M., Creese, S., Wright, G.R.T., Whitty, M.: Understanding insider threat: a framework for characterising attacks. In: Workshop on Research for Insider Threat (WRIT), in Conjunction with the IEEE Symposium on Security and Privacy (SP). IEEE, New York, 18 May 2014
6.
Zurück zum Zitat Marcus, B., Schuler, H.: Antecedents of counterproductive behavior at work: a general perspective. J. Appl. Psychol. 89(4), 647–660 (2004)CrossRef Marcus, B., Schuler, H.: Antecedents of counterproductive behavior at work: a general perspective. J. Appl. Psychol. 89(4), 647–660 (2004)CrossRef
7.
Zurück zum Zitat Wiggins, J.S.: The Five Factor Model of Personality: Theoretical Perspectives. Guildford Press, New York (1996)MATH Wiggins, J.S.: The Five Factor Model of Personality: Theoretical Perspectives. Guildford Press, New York (1996)MATH
8.
Zurück zum Zitat Paulhus, D.L., Williams, K.M.: The dark triad of personality: Narcissism, Machiavellianism, and psychopathy. J. Res. Pers. 36(6), 556–563 (2002)CrossRef Paulhus, D.L., Williams, K.M.: The dark triad of personality: Narcissism, Machiavellianism, and psychopathy. J. Res. Pers. 36(6), 556–563 (2002)CrossRef
9.
Zurück zum Zitat Schneier, B.: Attack trees. Dr. Dobbs J. 24(12), 21–29 (1999) Schneier, B.: Attack trees. Dr. Dobbs J. 24(12), 21–29 (1999)
10.
Zurück zum Zitat Hutchins, E.M., Cloppert, M.J., Amin, R.M.: Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Leading Issues Inf. Warfare Secur. Res. 1(1), 80 (2011) Hutchins, E.M., Cloppert, M.J., Amin, R.M.: Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Leading Issues Inf. Warfare Secur. Res. 1(1), 80 (2011)
24.
Zurück zum Zitat Walton, G.: China’s Golden Shield: Corporations and the Development of Surveillance Technology in the People’s Republic of China. International Centre for Human Rights and Democratic Development, Montreal (2001) Walton, G.: China’s Golden Shield: Corporations and the Development of Surveillance Technology in the People’s Republic of China. International Centre for Human Rights and Democratic Development, Montreal (2001)
Metadaten
Titel
Pervasive Monitoring as an Insider Threat
verfasst von
Dana Polatin-Reuben
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-20376-8_22