SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Toru Nakata,
Institute of Secure Systems, AIST, Japan.
Aug., 22, 2013.
toru-nakata@aist.go.jp
Human Factors on Information Security
1
Human, the weakest link
 Most of data leaking are caused by humans.
 Human factor is also the most dangerous for general
information security matters.
2
Misoperation
35%
Failure of info
management
33%
Lost the devices
14%
Stolen
7%
Brought
out
5%
Insider
Crime
2%
failure of
System
Setting
1%
Illegal
access
1%
Bug
1%
Appropriation
of Data
1%
Warm
0%
Cause of Leak
(From JNSA, 2011 Information Security
Report)
Human
Error
Five causes of information leak
3
Intentional
1. Human-Targeted Attack
2. Bringing out or lost of
data media
3. Mistake on sending
data to outside.
4. Insider Crime
5. Thoughtless leak on
Social Networking
Service
1. Human-Targeted Cyber Attack
 The Cyber attackers are becoming bigger and more organized.
 The targets shift to bigger and more focused.
 The arts of attack became more sophisticated and tailored for the particular
target.
4
Individual
Company-level
Country-level
Everyone
Particular
Organization
Particular Person
Human-Targeted
Cracker Group
DOS Attack
Mass Spam
Example of targeted attack email
 From Mandiant report.
 The attack is supposed from the Chinese army.
 Personating the president of the company.
 The link leads to download malware.
5
Date: Wed, 18 Apr 2012 06:31:41 -0700
From: Kevin Mandia <kevin.mandia@rocketmail.com>
Subject: Internal Discussion on the Press Release
Hello,
Shall we schedule a time to meet next week?
We need to finalize the press release.
Details click here.
Kevin Mandia
Typical Techniques of Trap Mail
 “Help me now ” type
 pretends someone troubled with computer,
 and demands tentative relaxation of security policy.
 “Please tell me the password to open the file.” etc.
 “Police impersonation” type
 commands and controls the victim
 “Open the attachment file. This is demanded by the
information security center.”
 “Ordinary information” type
 pretends unimportant mail.
 “Open the attachment to see spec of the new copy
machine.”
6
Those are not accidental human error, but
sophisticated techniques to reduce human wariness.
Prevention of targeted attack
 Equipment countermeasure
 Filteing of email.
 Automatic removal “exe” files
 Countermeasure on Human Management
 Education: “Vaccine Training”
 Information Management: Do not allow accesses to
important data by inadequate personnel.7
2. Bringing-out and lost of equipment
 Why bring out? Why copy files on USB memory?
 Overtime work at home
 Sending big files to customers.
 To convey files to stand-alone equipment.
 Why leaks?
 Lost of USB memory and/or smart phone.
 Attach big strap on such small equipment.
 Smart phones must be protected by passcode.
 Make Password Policy: how to make, share, and retire them.
 Not guarded equipment
 Left as initial setting/password.
 Peeping from side
 Do not open your laptop and smart phone in crowded
place.8
3. Failure on sending the file
 Prepare a clean model file and start the work from it.
 Do not use old file again.
 Some unwanted data may remains.9
Excel files may contain
unwanted sheet.
 Elimination of unintentional
data contained in a Word
file
Before and After sending
 Before: Check
Sending address, letter body, and
attachments.
But, email address is not easy to read.
Do not use unreliable methods
  Broadcast mail with hiding receivers’ mail
address listed in “BCC”
  Using mail as file sending machine too
much.
After: Cancelation of wrong mail
 Some new mail system can do this.10
4. Insider Crime: Information Theft
 To sell and get money.
 To protect oneself from company authority
 Secret documents described in movie “Erin Brockovich”
 By personal belief and/or political reason
 Wikileaks, etc.
 By selfish reason (but not spy-like crime)
 (From Symantec and Ponemon Report “Data Loss Risks
During Downsizing -- As Employees Exit, so does Corporate
Data”, 2009)
 “Employees are stealing data and are more likely to do so
when they don’t trust their employer.”
 “Employees are stealing proprietary and confidential data
that might affect their former company’s business
competitiveness and could result in a data breach.”11
5. Thoughtless leaks on SNS
 Tweet of confidential information about the job.
 Writing disgraceful matter in the company.
 Writing important news not knowing that is important.
 Leak preceding offical press release, etc.
 Why write?
 SNS seem a small networks of one’s friends.
 But, SNS are actually worldwide and open.
 In SNS, one can play it as almost anonymous.
 But, it is very easy to detect your identity from records of
your anonymous account.
12
Leakage from Cognitive Gap
Subordinate's view
“This info is
important.”
“It is not
important.”
Boss’s
View
“This info is
important.”
<Locked Door>
This info is dealt as
property.
<Door of Rumor>
This info is easy to
be leaked.
“It is not
important.”
<Glassed-In Door>
This info is used
without correct
permission.
<Free Door>
This info remain
neglected until
analysis technology
is invented.
13
Two doors of cognitive discord are
main routes of data loss and leak.
Provisions against Data Leakage
 Countermeasure on Equipment
 Security software and hardware are already prepared for
typical and ordinary patterns.
 On Individuals
 Awareness of danger is required for every employee.
 Clear policy, reasonable procedure, and kind education.
 On Organization: Security policy
 You cannot have everything: Usability vs. Security.
 Security is matter of choice.
 Company Policies of password, BYOD, cloud service
etc.
 Do not left the policies for individual employee.
14

Weitere ähnliche Inhalte

Was ist angesagt?

Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
Randy Bowman
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
R_Yanus
 

Was ist angesagt? (20)

Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
It security and awareness training 5 10-2018
It security and awareness training 5 10-2018It security and awareness training 5 10-2018
It security and awareness training 5 10-2018
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handout
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Jason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 PredictionsJason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 Predictions
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
GRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersGRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of users
 
Phil Grimes - Penetrating the Perimeter: Tales from the Battlefield
Phil Grimes - Penetrating the Perimeter: Tales from the BattlefieldPhil Grimes - Penetrating the Perimeter: Tales from the Battlefield
Phil Grimes - Penetrating the Perimeter: Tales from the Battlefield
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awareness
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Information Security Awareness Session -2020
Information Security Awareness Session -2020Information Security Awareness Session -2020
Information Security Awareness Session -2020
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
Cybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation SlidesCybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation Slides
 
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
Interop 2017 - Defeating Social Engineering, BEC, and PhishingInterop 2017 - Defeating Social Engineering, BEC, and Phishing
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Internet Security
Internet SecurityInternet Security
Internet Security
 

Ähnlich wie Human Factor on Information Security -- Origin of Information Leakage

Research Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docxResearch Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docx
audeleypearl
 
Toastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneToastmasters - Securing Your Smartphone
Toastmasters - Securing Your Smartphone
Hasani Jaali
 
Running Head DATA BREACH .docx
Running Head DATA BREACH                                        .docxRunning Head DATA BREACH                                        .docx
Running Head DATA BREACH .docx
todd271
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
Alison Gianotto
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
apyn
 
Data Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisData Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network Analysis
IJERD Editor
 
SplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud DetectionSplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud Detection
Splunk
 
How Safe is your Data?
How Safe is your Data?How Safe is your Data?
How Safe is your Data?
Michael Soltys
 

Ähnlich wie Human Factor on Information Security -- Origin of Information Leakage (20)

The CISO’s Guide to Being Human
The CISO’s Guide to Being HumanThe CISO’s Guide to Being Human
The CISO’s Guide to Being Human
 
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
 
Security awareness-checklist 2019
Security awareness-checklist 2019Security awareness-checklist 2019
Security awareness-checklist 2019
 
Research Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docxResearch Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docx
 
The Top Ten Insider Threats And How To Prevent Them
The Top Ten Insider Threats And How To Prevent ThemThe Top Ten Insider Threats And How To Prevent Them
The Top Ten Insider Threats And How To Prevent Them
 
Top 12 Threats to Enterprise
Top 12 Threats to EnterpriseTop 12 Threats to Enterprise
Top 12 Threats to Enterprise
 
Toastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneToastmasters - Securing Your Smartphone
Toastmasters - Securing Your Smartphone
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
CYBER SECURITY SEMINAR.pptx
CYBER SECURITY SEMINAR.pptxCYBER SECURITY SEMINAR.pptx
CYBER SECURITY SEMINAR.pptx
 
Running Head DATA BREACH .docx
Running Head DATA BREACH                                        .docxRunning Head DATA BREACH                                        .docx
Running Head DATA BREACH .docx
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
 
Security and the Service Desk
Security and the Service DeskSecurity and the Service Desk
Security and the Service Desk
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
Data Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisData Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network Analysis
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 
Users guide
Users guideUsers guide
Users guide
 
SplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud DetectionSplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud Detection
 
How Safe is your Data?
How Safe is your Data?How Safe is your Data?
How Safe is your Data?
 
Design and Implementation of algorithm for detecting sensitive data leakage i...
Design and Implementation of algorithm for detecting sensitive data leakage i...Design and Implementation of algorithm for detecting sensitive data leakage i...
Design and Implementation of algorithm for detecting sensitive data leakage i...
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 

Mehr von Toru Nakata

Mehr von Toru Nakata (9)

Typical Accident Pattern Detection
Typical Accident Pattern DetectionTypical Accident Pattern Detection
Typical Accident Pattern Detection
 
Nakata1503 jsse
Nakata1503 jsseNakata1503 jsse
Nakata1503 jsse
 
Nakata1503 jss
Nakata1503 jssNakata1503 jss
Nakata1503 jss
 
Improve Reliability of Check Tasks
Improve Reliability of Check TasksImprove Reliability of Check Tasks
Improve Reliability of Check Tasks
 
情報漏洩対策 20のツボ
情報漏洩対策 20のツボ情報漏洩対策 20のツボ
情報漏洩対策 20のツボ
 
Start small, fail fast の理論
Start small, fail fast の理論Start small, fail fast の理論
Start small, fail fast の理論
 
人的要因から見た情報セキュリティ(Japanese)
人的要因から見た情報セキュリティ(Japanese)人的要因から見た情報セキュリティ(Japanese)
人的要因から見た情報セキュリティ(Japanese)
 
Human Error Prevention
Human Error PreventionHuman Error Prevention
Human Error Prevention
 
ヒューマンエラーの防ぎ方(Japanese)
ヒューマンエラーの防ぎ方(Japanese)ヒューマンエラーの防ぎ方(Japanese)
ヒューマンエラーの防ぎ方(Japanese)
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 

Human Factor on Information Security -- Origin of Information Leakage

  • 1. Toru Nakata, Institute of Secure Systems, AIST, Japan. Aug., 22, 2013. toru-nakata@aist.go.jp Human Factors on Information Security 1
  • 2. Human, the weakest link  Most of data leaking are caused by humans.  Human factor is also the most dangerous for general information security matters. 2 Misoperation 35% Failure of info management 33% Lost the devices 14% Stolen 7% Brought out 5% Insider Crime 2% failure of System Setting 1% Illegal access 1% Bug 1% Appropriation of Data 1% Warm 0% Cause of Leak (From JNSA, 2011 Information Security Report)
  • 3. Human Error Five causes of information leak 3 Intentional 1. Human-Targeted Attack 2. Bringing out or lost of data media 3. Mistake on sending data to outside. 4. Insider Crime 5. Thoughtless leak on Social Networking Service
  • 4. 1. Human-Targeted Cyber Attack  The Cyber attackers are becoming bigger and more organized.  The targets shift to bigger and more focused.  The arts of attack became more sophisticated and tailored for the particular target. 4 Individual Company-level Country-level Everyone Particular Organization Particular Person Human-Targeted Cracker Group DOS Attack Mass Spam
  • 5. Example of targeted attack email  From Mandiant report.  The attack is supposed from the Chinese army.  Personating the president of the company.  The link leads to download malware. 5 Date: Wed, 18 Apr 2012 06:31:41 -0700 From: Kevin Mandia <kevin.mandia@rocketmail.com> Subject: Internal Discussion on the Press Release Hello, Shall we schedule a time to meet next week? We need to finalize the press release. Details click here. Kevin Mandia
  • 6. Typical Techniques of Trap Mail  “Help me now ” type  pretends someone troubled with computer,  and demands tentative relaxation of security policy.  “Please tell me the password to open the file.” etc.  “Police impersonation” type  commands and controls the victim  “Open the attachment file. This is demanded by the information security center.”  “Ordinary information” type  pretends unimportant mail.  “Open the attachment to see spec of the new copy machine.” 6 Those are not accidental human error, but sophisticated techniques to reduce human wariness.
  • 7. Prevention of targeted attack  Equipment countermeasure  Filteing of email.  Automatic removal “exe” files  Countermeasure on Human Management  Education: “Vaccine Training”  Information Management: Do not allow accesses to important data by inadequate personnel.7
  • 8. 2. Bringing-out and lost of equipment  Why bring out? Why copy files on USB memory?  Overtime work at home  Sending big files to customers.  To convey files to stand-alone equipment.  Why leaks?  Lost of USB memory and/or smart phone.  Attach big strap on such small equipment.  Smart phones must be protected by passcode.  Make Password Policy: how to make, share, and retire them.  Not guarded equipment  Left as initial setting/password.  Peeping from side  Do not open your laptop and smart phone in crowded place.8
  • 9. 3. Failure on sending the file  Prepare a clean model file and start the work from it.  Do not use old file again.  Some unwanted data may remains.9 Excel files may contain unwanted sheet.  Elimination of unintentional data contained in a Word file
  • 10. Before and After sending  Before: Check Sending address, letter body, and attachments. But, email address is not easy to read. Do not use unreliable methods   Broadcast mail with hiding receivers’ mail address listed in “BCC”   Using mail as file sending machine too much. After: Cancelation of wrong mail  Some new mail system can do this.10
  • 11. 4. Insider Crime: Information Theft  To sell and get money.  To protect oneself from company authority  Secret documents described in movie “Erin Brockovich”  By personal belief and/or political reason  Wikileaks, etc.  By selfish reason (but not spy-like crime)  (From Symantec and Ponemon Report “Data Loss Risks During Downsizing -- As Employees Exit, so does Corporate Data”, 2009)  “Employees are stealing data and are more likely to do so when they don’t trust their employer.”  “Employees are stealing proprietary and confidential data that might affect their former company’s business competitiveness and could result in a data breach.”11
  • 12. 5. Thoughtless leaks on SNS  Tweet of confidential information about the job.  Writing disgraceful matter in the company.  Writing important news not knowing that is important.  Leak preceding offical press release, etc.  Why write?  SNS seem a small networks of one’s friends.  But, SNS are actually worldwide and open.  In SNS, one can play it as almost anonymous.  But, it is very easy to detect your identity from records of your anonymous account. 12
  • 13. Leakage from Cognitive Gap Subordinate's view “This info is important.” “It is not important.” Boss’s View “This info is important.” <Locked Door> This info is dealt as property. <Door of Rumor> This info is easy to be leaked. “It is not important.” <Glassed-In Door> This info is used without correct permission. <Free Door> This info remain neglected until analysis technology is invented. 13 Two doors of cognitive discord are main routes of data loss and leak.
  • 14. Provisions against Data Leakage  Countermeasure on Equipment  Security software and hardware are already prepared for typical and ordinary patterns.  On Individuals  Awareness of danger is required for every employee.  Clear policy, reasonable procedure, and kind education.  On Organization: Security policy  You cannot have everything: Usability vs. Security.  Security is matter of choice.  Company Policies of password, BYOD, cloud service etc.  Do not left the policies for individual employee. 14