Internal Network Security
Internal Network Security
Abstract— This paper will attempt to inform the reader about internal threats to network
security, including insider threats, vulnerabilities through the internet, user error creating
organization as a whole.
network security
a major incident.
can think of, because the concept itself is engineering-based breach, in 2022 and 2023
based on convincing people of something. Mailchimp was targeted multiple times, and
human errors are very much a factor in It just means software or services that the
business. However, there are some software employee finds easier to use, or more
possibilities in the form of things like DLP, efficient, etc. than what they are supplied
or Data Loss Prevention, software that can with by the company. This is a failing of the
track, secure, and block sensitive company to provide software that is able to
side of things, in May 2023 Tesla was open conversation between employees and
informed by a German news outlet that their employer on the requirements of the job,
information had been leaked. Investigation though this doesn’t happen as often as it
Gartner are that nearly 50% of all stole sensitive research data, including
cyberattacks stem from shadow IT, cost an strategies against their competitors, an
average of $4.2 million each to repair, and analysis of said competitors, the source code
budgets go to mitigating shadow IT use. [4] other files. This was done allegedly via two
statistics about shadow IT. [5] than with shadow IT, but still difficult to
shadow IT: they are the physical items used As opposed to the data theft depicted
missing device, they tend to report it. But if are also encouraged.
As an example, and to show that any cameras, guards, etc. Train employees to
sector can have this issue, in Ottawa, lock up devices with sensitive data, or to not
Ontario, Canada in May 2018, a government travel with those devices unless absolutely
[1] CISA, “Defining Insider Threats,” Cybersecurity and Infrastructure Security Agency CISA,
2023. https://www.cisa.gov/topics/physical-security/insider-threat-mitigation/defining-insider-
threats (accessed Sep. 29, 2024).
[2] Andrada Coos, “Top 5 Internal Data Security Threats and How to Deal with Them,”
Endpoint Protector Blog, Mar. 05, 2020. https://www.endpointprotector.com/blog/top-5-internal-
data-security-threats-and-how-to-deal-with-them/ (accessed Sep. 29, 2024).
[3] L. Pryimenko, “Top 5 Real-Life Examples of Breaches Caused by Insider Threats,” Ekran
System, Feb. 28, 2024. https://www.ekransystem.com/en/blog/real-life-examples-insider-threat-
caused-breaches (accessed Sep. 29, 2024).
[4] K. Lake, “What Is Shadow IT?,” JumpCloud, Oct. 14, 2022.
https://jumpcloud.com/blog/shadow-it (accessed Sep. 29, 2024).
[5] K. Shuler, “45+ Shadow IT Statistics for 2023,” quandarycg.com, May 16, 2024.
https://quandarycg.com/shadow-IT-statistics/ (accessed Sep. 29, 2024).
[6] A. Team, “4 Recent Data Breaches that Originated on the Endpoint - Absolute Blog | The
Leader in Endpoint Visibility and Control,” Absolute Blog | The Leader in Endpoint Visibility
and Control, Aug. 26, 2019. https://www.absolute.com/blog/4-recent-data-breaches-that-
originated-on-the-endpoint/ (accessed Sep. 29, 2024).