Threats to Data Summary - CSU1288 - Shoolini U

Summary of Threats to Data: Internal and External

1. Introduction to Data Threats


2. Internal Threats

Types of Internal Threats
  1. Malicious Insiders: Employees intentionally harming systems or stealing data.
  2. Negligent Insiders: Employees causing harm due to carelessness or poor security practices.
  3. Privilege Abuse: Unauthorized use of elevated access rights.
Case Study: Edward Snowden (2013)

3. External Threats

Types of External Threats
  1. Phishing Attacks: Fraudulent emails tricking users into revealing sensitive data.
    • Example: 2016 U.S. Presidential Election Email Hack (DNC targeted via phishing).
  2. Denial-of-Service (DoS) Attacks: Overloading a system to make it unavailable.
    • DDoS (Distributed DoS): Multiple sources attack simultaneously.
  3. Malware & Ransomware: Malicious software designed to harm or exploit systems.
    • Example: WannaCry (2017) ransomware attack on global organizations.
  4. SQL Injection: Exploiting database vulnerabilities to manipulate or extract data.
    • Example: 2009 Heartland Payment Systems Hack (100+ million card numbers stolen).

4. Comparison: Internal vs. External Threats

Factor Internal Threats External Threats
Source Employees, vendors Hackers, cybercriminals
Motivation Negligence or intent Financial gain, activism, espionage
Impact Direct damage to assets Data breaches, service outages

5. Security Measures

For Internal Threats
  1. Access Control: Apply the principle of least privilege (PoLP).
  2. Employee Monitoring: Log analysis and behavior tracking.
  3. Security Awareness Training: Educate employees on best practices.
  4. Incident Response Plan: Rapid response to insider threats.
For External Threats
  1. Firewalls: Prevent unauthorized access.
  2. Antivirus/Anti-malware: Detect and block malicious software.
  3. Encryption: Protect sensitive data.
  4. Intrusion Detection & Prevention Systems (IDS/IPS): Monitor and block threats.

6. Mitigation Strategies