Page 373 - ITGC_Audit Guides
P. 373

Examples of unintentional acts that can result in
                   data breaches include:                            Cost of Insider Related Incidents
                                                                     Reported Over a 12-Month Period
                   Accidental disclosure – An insider unintentionally
                   or erroneously publishes or mishandles sensitive     Total number of insider
                   information,  or  sends  it  to  the  wrong  party  via   incidents: 3,269.
                   email, fax, mail, or social media posting.          Total average cost: $8.76 million.
                                                                       Incidents relating to
                   Phishing/social  engineering  –  An  outsider’s
                                                                         negligence: 64%.
                   electronic  entry  is  acquired  through  social
                                                                       Incidents relating to criminal
                   engineering (e.g. phishing email attack, planted or
                                                                         insider: 23%.
                   unauthorized  USB  drive)  to  acquire  an  insider’s
                   credentials or to plan malware to gain access.      Incidents relating to user
                                                                         credential theft: 13%.
                   Unauthorized  access  to  physical  records  –  Lost,   Source: Research: Ponemon Institute©, and
                   discarded, or stolen nonelectronic records, such as   Sponsorship: ObserveIT, 2018 Cost of Insider
                   paper documents, are accessed by unauthorized or   Threats: Global, April 2018.
                   malicious users.

                   Unauthorized  access  to  portable  equipment  –
                   Lost, discarded, or stolen data storage devices, such as a laptop, smartphone, portable memory
                   device, CD, hard drive, or data tape are accessed by unauthorized or malicious users.



                   Anatomy of an Insider Threat

                   To build the profile of an insider threat, it is important to consider multiple factors (dimensions)
                   such as who represents the threat, what assets can be targeted, the motivation for the attack, and
                   the potential effects on the organization.

                   Threat Source or Actor

                   Insider  threats  are  not  necessarily  hackers  or  cybercrime  experts,  which  makes  the  task  of
                   identifying  them  difficult.  Insiders  by  definition  are  individuals  or  entities  that  have  or  had
                   authorized access to the organization’s information and information systems (physical or logical).
                   Common threat actors that should  be  considered  when  building  insider threat profiles or risk
                   scenarios include:

                         Current or former employees.

                         Full-time or part-time employees.
                         Temporary employees or contractors.
                         Trusted business partners.






                         www.theiia.org                                      Auditing Insider Threat Programs   6
   368   369   370   371   372   373   374   375   376   377   378