fbpx
Wikipedia

Data theft

Data theft is the unauthorized duplication or deletion of an organization's electronic information, by employees with access to it.

Data theft is a growing phenomenon primarily caused by system administrators and office workers with access to technology such as database servers, desktop computers and a growing list of hand-held devices capable of storing digital information, such as USB flash drives, iPods and even digital cameras.[1] Since employees often spend a considerable amount of time developing contacts, confidential, and copyrighted information for the company they work for, they may feel they have some right to the information and are inclined to copy or delete part of it when they leave the company, or misuse it while they are still in employment. Information can be sold and bought and then used by criminals and criminal organizations.[2] Alternatively, an employee may choose to deliberately abuse trusted access to information for the purpose of exposing misconduct by the employer. From the perspective of the society, such an act of whistleblowing can be seen as positive[3] and is protected by law in certain situations in some jurisdictions, such as the United States.

A common scenario is where a sales person makes a copy of the contact database for use in their next job. Typically, this is a clear violation of their terms of employment.

Notable acts of data theft include those by leaker Chelsea Manning and self-proclaimed whistleblowers Edward Snowden and Hervé Falciani.

Data theft methods edit

Thumbsucking edit

Thumbsucking, similar to podslurping, is the intentional or undeliberate use of a portable USB mass storage device, such as a USB flash drive (or "thumbdrive"), to illicitly download confidential data from a network endpoint.[4]

A USB flash drive was allegedly used to remove without authorization highly classified documents about the design of U.S. nuclear weapons from a vault at Los Alamos.[5]

The threat of thumbsucking has been amplified for a number of reasons, including the following:

  • The storage capacity of portable USB storage devices has increased.
  • The cost of high-capacity portable USB storage devices has decreased.
  • Networks have grown more dispersed, the number of remote network access points has increased and methods of network connection have expanded, increasing the number of vectors for network infiltration.

Data Leakage edit

Data leak is part of insider attack that accidental or unintentional data loss because of specific circuit stances.[6]

Investigating data theft edit

Techniques to investigate data theft include stochastic forensics, digital artifact analysis (especially of USB drive artifacts), and other computer forensics techniques.

See also edit

References edit

  1. ^ Ian (2021-11-06). "The Data Theft You Never Hear About". Steadfast Solutions. Retrieved 2022-07-11.
  2. ^ Xing, Liudong; Levitin, Gregory (November 2017). "Balancing theft and corruption threats by data partition in cloud system with independent server protection". Reliability Engineering & System Safety. 167: 248–254. doi:10.1016/j.ress.2017.06.006.
  3. ^ Schneier, Bruce (10 June 2013). "Government Secrets and the Need for Whistle-blowers". Schneier on Security. Retrieved 15 February 2015.
  4. ^ . Archived from the original on August 19, 2007. Retrieved 15 February 2015.
  5. ^ Zagorin, Adam "A breach in nuclear security." 2008-01-31 at the Wayback Machine Time, April 19, 2007. Retrieved April 21, 2007
  6. ^ Stolfo, salvatore (2008). Insider Attack and Cyber Security Beyond the Hacker. Boston, MA: Springer US.

External links edit

data, theft, unauthorized, duplication, deletion, organization, electronic, information, employees, with, access, growing, phenomenon, primarily, caused, system, administrators, office, workers, with, access, technology, such, database, servers, desktop, compu. Data theft is the unauthorized duplication or deletion of an organization s electronic information by employees with access to it Data theft is a growing phenomenon primarily caused by system administrators and office workers with access to technology such as database servers desktop computers and a growing list of hand held devices capable of storing digital information such as USB flash drives iPods and even digital cameras 1 Since employees often spend a considerable amount of time developing contacts confidential and copyrighted information for the company they work for they may feel they have some right to the information and are inclined to copy or delete part of it when they leave the company or misuse it while they are still in employment Information can be sold and bought and then used by criminals and criminal organizations 2 Alternatively an employee may choose to deliberately abuse trusted access to information for the purpose of exposing misconduct by the employer From the perspective of the society such an act of whistleblowing can be seen as positive 3 and is protected by law in certain situations in some jurisdictions such as the United States A common scenario is where a sales person makes a copy of the contact database for use in their next job Typically this is a clear violation of their terms of employment Notable acts of data theft include those by leaker Chelsea Manning and self proclaimed whistleblowers Edward Snowden and Herve Falciani Contents 1 Data theft methods 1 1 Thumbsucking 1 2 Data Leakage 2 Investigating data theft 3 See also 4 References 5 External linksData theft methods editThumbsucking edit Thumbsucking similar to podslurping is the intentional or undeliberate use of a portable USB mass storage device such as a USB flash drive or thumbdrive to illicitly download confidential data from a network endpoint 4 A USB flash drive was allegedly used to remove without authorization highly classified documents about the design of U S nuclear weapons from a vault at Los Alamos 5 The threat of thumbsucking has been amplified for a number of reasons including the following The storage capacity of portable USB storage devices has increased The cost of high capacity portable USB storage devices has decreased Networks have grown more dispersed the number of remote network access points has increased and methods of network connection have expanded increasing the number of vectors for network infiltration Data Leakage edit Data leak is part of insider attack that accidental or unintentional data loss because of specific circuit stances 6 Investigating data theft editTechniques to investigate data theft include stochastic forensics digital artifact analysis especially of USB drive artifacts and other computer forensics techniques See also editPod slurping Bluesnarfing Sneakernet Data breachReferences edit Ian 2021 11 06 The Data Theft You Never Hear About Steadfast Solutions Retrieved 2022 07 11 Xing Liudong Levitin Gregory November 2017 Balancing theft and corruption threats by data partition in cloud system with independent server protection Reliability Engineering amp System Safety 167 248 254 doi 10 1016 j ress 2017 06 006 Schneier Bruce 10 June 2013 Government Secrets and the Need for Whistle blowers Schneier on Security Retrieved 15 February 2015 Do you know who is sucking data from your computer Archived from the original on August 19 2007 Retrieved 15 February 2015 Zagorin Adam A breach in nuclear security Archived 2008 01 31 at the Wayback Machine Time April 19 2007 Retrieved April 21 2007 Stolfo salvatore 2008 Insider Attack and Cyber Security Beyond the Hacker Boston MA Springer US External links editUSBs Giant Sucking Sound permanent dead link Readers Weigh In Is the IPod a Threat or a Scapegoat Online Behaviours that can Lead to Data Theft Retrieved from https en wikipedia org w index php title Data theft amp oldid 1207303923, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.