Page 374 - ITGC_Audit Guides
P. 374

While it is difficult to identify the individuals that are at the highest risk of performing malicious
                   activities,  it  may  be  helpful  to  understand  some  of  the  characteristics  that  may  be  used  to
                   develop a behavioral baseline for identifying insider threat actors. Figure 2 displays a list of “red
                   flag”  behavioral  characteristics  issued  by  the  National  Cybersecurity  and  Communications
                   Integration Center. Note that the listing of these characteristics does not represent importance
                   or likelihood.


                   Figure 2: Characteristics of Insiders at Risk of Becoming a Threat
                                                                Overly concerned with avoiding, concealing,
                    Introversion.
                                                                or fixing mistakes.
                    Greed/financial need.                       Inability to assume responsibility for actions.
                    Vulnerability to blackmail.                 Intolerance of criticism.
                    Compulsive and destructive behavior.        Self-perceived value exceeding performance.
                    Rebellious, passive aggressive behavior.    Lack of empathy.

                    Ethical “flexibility.”                      Pattern of frustration and disappointment.
                    Entitlement – narcissism (ego/self-image).   History of managing crisis ineffectively.

                   Source: National Cybersecurity and Communications Integration Center, Combating the Insider Threat, 1.



                   Target
                   Targets include assets or any items of value to the
                   organization  that  can  be  affected  by  the  threat   Possible Indicators That a
                   and result in negative impact to the organization,   Vulnerability Is Being Exploited
                   including:
                                                                       Cloud storage uploads.
                         People.                                      Removable storage use.
                         Information.                                 Working odd hours without
                         Technology.                                    authorization.

                         Facilities.                                  Email to external agent or
                                                                         personal email account.
                   Motivation                                          Excessive printing or copying
                   The  motivations  for  an  insider  threat  actor  to   proprietary or classified material.
                   engage in nonmalicious activities are significantly     Requesting access to previously
                   varied  and  numerous.  Anything  from  personal      denied areas or systems.
                   issues  outside  of  the  office  to  issues  with
                   colleagues  and  management,  as  well  as
                   opportunity and boredom could lead an individual
                   to engage in these activities.






                         www.theiia.org                                      Auditing Insider Threat Programs   7
   369   370   371   372   373   374   375   376   377   378   379