IT Nightmare: The Enemy Within

    Date30 Jul 2002
    3245
    Posted ByAnthony Pell
    The discovery that employees are attacking internal systems is a challenge because the majority of security monitoring is focused on the outside perimeter of the organization, not on the inside. All it took for Tim Lloyd to destroy more than . . . The discovery that employees are attacking internal systems is a challenge because the majority of security monitoring is focused on the outside perimeter of the organization, not on the inside. All it took for Tim Lloyd to destroy more than 1,000 of his employer's programs was about a half-dozen lines of code.

    Lloyd, employed for 11 years by Stamford, Connecticut-based Omega Engineer Corp. as a network administrator, was convicted in May 2000 of doing US$10 million in damages to the company by deleting proprietary programs.

    While Lloyd maintains his innocence, his case represented one of the first federal prosecutions of computer sabotage. Such a situation is every business' worst fear: that employees could betray their trust and attack their computer systems from the inside.

    You are not authorised to post comments.

    LinuxSecurity Poll

    Do you reuse passwords across multiple accounts?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    13
    radio
    [{"id":"55","title":"Yes","votes":"4","type":"x","order":"1","pct":80,"resources":[]},{"id":"56","title":"No","votes":"1","type":"x","order":"2","pct":20,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.