Attacks/Breaches
3/14/2014
03:00 PM
Becca Lipman
Becca Lipman
News
100%
0%

7 Behaviors That Could Indicate A Security Breach

Breaches create outliers. Identifying anomalous activity can help keep firms in compliance and out of the headlines.

Here's a rather uncontested statement: In the world of cybersecurity, there are many things that can go wrong.

Some breaches are intentional, others accidental. A case in which an employee unwittingly discloses confidential information or is working from an infected machine may look similar to the actions of employee who has gone rogue by uploading or downloading inappropriate data.

Regardless of its cause, determining whether a behavior is normal or not is important when it comes to detecting a variety of security breaches.

Skyhigh Networks compiled the following real-world examples of behaviors that security teams identified as several standard deviations outside of normal activity.

Read the rest of this article on Wall Street & Technology.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
pfretty
100%
0%
pfretty,
User Rank: Apprentice
3/17/2014 | 3:32:50 PM
Not just staying out of headlines, but avoiding the costs
It's crucial to pay close attention to the warning signs. According to the Ponemon 2013 Cost of Cyber Crime Report (http://www.hpenterprisesecurity.com/ponemon-study-2013), the average company experiences 100+ attacks per year at a cost of $11.6 million. These make breaches not just cause embrassment, but in many instances can be crippling to even the most otherwise stable organizations. Fighting off attacks starts with strategy and technology and continues to improve through education. 

 

Peter Fretty, IDG blogger working on behalf of HP
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-3216
Published: 2015-07-07
Race condition in a certain Red Hat patch to the PRNG lock implementation in the ssleay_rand_bytes function in OpenSSL, as distributed in openssl-1.0.1e-25.el7 in Red Hat Enterprise Linux (RHEL) 7 and other products, allows remote attackers to cause a denial of service (application crash) by establi...

CVE-2014-3653
Published: 2015-07-06
Cross-site scripting (XSS) vulnerability in the template preview function in Foreman before 1.6.1 allows remote attackers to inject arbitrary web script or HTML via a crafted provisioning template.

CVE-2014-5406
Published: 2015-07-06
The Hospira LifeCare PCA Infusion System before 7.0 does not validate network traffic associated with sending a (1) drug library, (2) software update, or (3) configuration change, which allows remote attackers to modify settings or medication data via packets on the (a) TELNET, (b) HTTP, (c) HTTPS, ...

CVE-2014-9737
Published: 2015-07-06
Open redirect vulnerability in the Language Switcher Dropdown module 7.x-1.x before 7.x-1.4 for Drupal allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in a block.

CVE-2014-9738
Published: 2015-07-06
Multiple cross-site scripting (XSS) vulnerabilities in the Tournament module 7.x-1.x before 7.x-1.2 for Drupal allow remote authenticated users with certain permissions to inject arbitrary web script or HTML via an (1) account username, a (2) node title, or a (3) team entity title.

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report