90 likes | 234 Views
The enemy from within : data leakage ISCD 2013 Hungary 2 nd September 2013. Guido Vervaet Security Directorate DG Human Resources and Security. Mandate of Commission's Security Directorate. to protect : personnel information assets and premises. Threats to confidentiality.
E N D
The enemy from within :data leakage ISCD 2013Hungary2nd September 2013 Guido Vervaet Security Directorate DG Human Resources and Security
Mandate of Commission's Security Directorate to protect : personnel information assets and premises
Threats to confidentiality • Casualeavesdropping • Hacking and espionage by : • (h)activists, • criminal organisations • foreign intelligence services • (deliberate) leakage by members of staff
Data leakage versus hacking • - By outsiders • - unvoluntary victims • - High tech • - Difficult to prevent • - Very difficult to prosecute • - By insiders • - By deliberate action • - Lowtech • - Verydifficult to prevent • - Easyto prosecute But very similar cures
Risks • Political harm • Financial liability • Reputational damage
Context • tons of sensitive information • internal and external actors • multiple loyalties • ubiquity of computers, networks, iphones, … • culture of "transparancy" • user requirements for: • speed • efficiency • userfriendliness • no prosecution, no condemnation, no deterrence
Possible approaches • Prevent – stopping data from being leaked • Deter – dissuading users from leaking data • Detect – detecting when information has been leaked • Contain – limiting the impact of a leak • Identify – determining the responsible for the leak
Countermeasures • classify sensitive documents • add handling instructions • apply "need-to-know" • tag documents (openly and covertly) • log document access and data exchange • emphasize ethical standards • disciplinary procedures when rules are breached