Skip to main content

2021 | OriginalPaper | Buchkapitel

Protect Against Unintentional Insider Threats: The Risk of an Employee’s Cyber Misconduct on a Social Media Site

verfasst von : Guerrino Mazzarolo, Juan Carlos Fernández Casas, Anca Delia Jurcut, Nhien-An Le-Khac

Erschienen in: Cybercrime in Context

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Social media is a cybersecurity risk for every business. What do people share on the Internet? Almost everything about oneself is shared: friendship, demographics, family, activities and work-related information. This could become a potential risk in every business if the organisation’s policies, training and technology fail to properly address these issues. In many cases, it is the employees’ behaviour that can put key company information at danger. Social media has turned into a reconnaissance tool for malicious actors and users accounts are now seen as a goldmine for cyber criminals. Investigation of social media is in the embryonic stage and thus is not yet well understood. This research project aims to collect and analyse open-source data from LinkedIn, discover data leakage and analyse personality types through software as a service (SAAS). The final aim of the study is to understand if there are behavioural factors that can predict one’s attitude towards disclosing sensitive data.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
In the counter-intelligence (CI) field, the acronym MICE (Money, Ideology, Coercion/Commitment and Ego) has been fully accepted by the CI community for decades as the main ‘motivational and emotional aspects’ for the act of disclosing information. Those four factors obviously implied some kind of weakness or vulnerability. Sometimes, a mix of two or three of these factors also are decisive as motivation. Nowadays, an alternative framework is being discussed and accepted by some CI experts. It is the path from MICE to RASCLS, the acronym for reciprocation, authority, scarcity, commitment (and consistency), liking and social proof. According to the former CIA National Clandestine Service (NCS) officer Randy Burkett, today’s CI departments often deal with non-state actors with complex mixtures of competing loyalties, including family, tribe, religion, ethnicity and nationalism (Burkett, 2013).
 
2
Edward Snowden (1983) is an American citizen, a former Central Intelligence Agency (CIA) employee and subcontractor (Booz Allen Hamilton Co.) who leaked top-secret information from the National Security Agency (NSA) in 2013. Snowden gradually became disillusioned with the NSA global surveillance programs he was involved since he considered they were a clear intrusion into people’s private lives. Although he tried to raise his ethical concerns through internal channels, nobody paid enough attention to the warnings that Snowden could become (was becoming) an ‘insider threat’. Edward Snowden could be considered as an example of ‘insider threat’ with an ethical commitment. According to Snowden, he considers himself a whistle-blower despite a leaker since he did not leak the intel for ‘personal profit’.
 
3
Chelsea Manning (1987) born as male Bradley Manning, she got female gender identity in 2013. She was a former US Army soldier working as intelligence analyst posted in Iraq in 2009. She leaked sensitive US intel (up to 750,000 documents) to WikiLeaks. She was imprisoned from 2010 until 2017 when her sentence was commuted. According to several military psychiatrists that assessed Manning’s personality and psychology during the trial, Manning had been isolated in the Army while dealing with her gender identity dichotomy. The specialists considered that Manning had the perception that her leaks were positively changing the world. Chelsea Manning could be considered as an ‘insider threat’ under the parameters of psychological imbalance (gender dichotomy and ego) combined with an ethical commitment for a better world.
 
4
Robert Hanssen (1944) is a former Federal Bureau of Investigation (FBI) senior intelligence officer who spied for the Soviet Main Intelligence Directorate (GRU) from 1979 to 2001. Hanssen sold thousands of classified documents to the KGB for more than $1.4 million in cash and diamonds. The intel provided by Hanssen to the Russians detailed US strategies in nuclear war, military weapons technologies and counter-intelligence. He is currently serving 15 consecutive life sentences. According to the US Department of Justice, Hanssen’s acts of espionage could be considered ‘possibly the worst intelligence disaster in US history’. Robert Hanssen is a clear example of ‘insider threat’ with a profit motivation (money).
 
Literatur
Zurück zum Zitat Burkett, R. (2013). An alternative framework for agent recruitment: From MICE to RASCLS. Studies in Intelligence, 57(1), 7–17. Burkett, R. (2013). An alternative framework for agent recruitment: From MICE to RASCLS. Studies in Intelligence, 57(1), 7–17.
Zurück zum Zitat Cappelli, D. M., Moore, A. P., & Trzeciak, R. F. (2012). The CERT guide to insider threats. Cappelli, D. M., Moore, A. P., & Trzeciak, R. F. (2012). The CERT guide to insider threats.
Zurück zum Zitat Carnegie Mellon University. (2013). Unintentional insider threats: A foundational study. Pittsburgh, PA: Carnegie Mellon University. Carnegie Mellon University. (2013). Unintentional insider threats: A foundational study. Pittsburgh, PA: Carnegie Mellon University.
Zurück zum Zitat Chauhan, S., & Panda, N. K. (2015). Hacking web intelligence: Open source intelligence and web reconnaissance concepts and techniques (p. 101). Waltham, MA: Syngress.CrossRef Chauhan, S., & Panda, N. K. (2015). Hacking web intelligence: Open source intelligence and web reconnaissance concepts and techniques (p. 101). Waltham, MA: Syngress.CrossRef
Zurück zum Zitat Cross, M. (2014). Social media security. Leveraging social networking while mitigating risk. Waltham, MA: Syngress Publishing, Inc.. Cross, M. (2014). Social media security. Leveraging social networking while mitigating risk. Waltham, MA: Syngress Publishing, Inc..
Zurück zum Zitat D’Agostino, D., & Skloot, G. (2019). Predicting personality: Using AI to understand people and win more business. Hoboken, NJ: John Wiley & Sons. D’Agostino, D., & Skloot, G. (2019). Predicting personality: Using AI to understand people and win more business. Hoboken, NJ: John Wiley & Sons.
Zurück zum Zitat Gamachchi, A., & Boztas, S. (2017). Insider threat detection through attributed graph clustering. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications Gamachchi, A., & Boztas, S. (2017). Insider threat detection through attributed graph clustering. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
Zurück zum Zitat Holt, T. J., & Bossler, A. M. (2016). Cybercrime in progress: Theory and prevention of technology-enabled offenses. Crime science series (p. 156). London: Routledge. Holt, T. J., & Bossler, A. M. (2016). Cybercrime in progress: Theory and prevention of technology-enabled offenses. Crime science series (p. 156). London: Routledge.
Zurück zum Zitat Karampelas, P. (2017). An organizational visualization profiler tool based on social interactions (pp. 369–394). Cham: Springer International Publishing. Karampelas, P. (2017). An organizational visualization profiler tool based on social interactions (pp. 369–394). Cham: Springer International Publishing.
Zurück zum Zitat Long, D. J. (2004). Google hacking for penetration testers. Rockland, MA: Syngress Publishing, Inc.. Long, D. J. (2004). Google hacking for penetration testers. Rockland, MA: Syngress Publishing, Inc..
Zurück zum Zitat Mahfuth, A. (2019). Human factor as insider threat in organizations. International Journal of Computer Science and Information Security (IJCSIS), 17(12), December 2019 issue. Mahfuth, A. (2019). Human factor as insider threat in organizations. International Journal of Computer Science and Information Security (IJCSIS), 17(12), December 2019 issue.
Zurück zum Zitat Marston, W. M. (2008). Emotions of normal people. Louth: Cooper Press. Marston, W. M. (2008). Emotions of normal people. Louth: Cooper Press.
Zurück zum Zitat Nihad, & Rami. (2018). Open source intelligence methods and tools: A practical guide to online intelligence. New York City: USA. Apress Publisher. Nihad, & Rami. (2018). Open source intelligence methods and tools: A practical guide to online intelligence. New York City: USA. Apress Publisher.
Zurück zum Zitat Zulkarnaen, R., Daud, M., Ghani, S., & Hery. (2016). Human factor of online social media cybersecurity. Risk impact on critical National Information Infrastructure (p. 196). Cham: Springer International Publishing. Zulkarnaen, R., Daud, M., Ghani, S., & Hery. (2016). Human factor of online social media cybersecurity. Risk impact on critical National Information Infrastructure (p. 196). Cham: Springer International Publishing.
Metadaten
Titel
Protect Against Unintentional Insider Threats: The Risk of an Employee’s Cyber Misconduct on a Social Media Site
verfasst von
Guerrino Mazzarolo
Juan Carlos Fernández Casas
Anca Delia Jurcut
Nhien-An Le-Khac
Copyright-Jahr
2021
Verlag
Springer International Publishing
DOI
https://doi.org/10.1007/978-3-030-60527-8_6