HOME

TheInfoList



OR:

Data theft is a growing phenomenon primarily caused by system administrators and office workers with access to technology such as database servers,
desktop computer A desktop computer (often abbreviated desktop) is a personal computer designed for regular use at a single location on or near a desk due to its size and power requirements. The most common configuration has a case that houses the power supply ...
s and a growing list of hand-held devices capable of storing digital information, such as
USB flash drive Universal Serial Bus (USB) is an industry standard that establishes specifications for cables, connectors and protocols for connection, communication and power supply ( interfacing) between computers, peripherals and other computers. A bro ...
s,
iPod The iPod is a discontinued series of portable media players and multi-purpose mobile devices designed and marketed by Apple Inc. The first version was released on October 23, 2001, about months after the Macintosh version of iTunes wa ...
s and even digital cameras. Since employees often spend a considerable amount of time developing contacts,
confidential Confidentiality involves a set of rules or a promise usually executed through confidentiality agreements that limits the access or places restrictions on certain types of information. Legal confidentiality By law, lawyers are often required ...
, and
copyright A copyright is a type of intellectual property that gives its owner the exclusive right to copy, distribute, adapt, display, and perform a creative work, usually for a limited time. The creative work may be in a literary, artistic, educatio ...
ed information for the company they work for, they may feel they have some right to the information and are inclined to copy and/or delete part of it when they leave the company, or misuse it while they are still in employment. Information can be sold and bought and then used by criminals and criminal organizations. Alternatively, an employee may choose to deliberately abuse trusted access to information for the purpose of exposing
misconduct Misconduct is wrongful, improper, or unlawful conduct motivated by premeditated or intentional purpose or by obstinate indifference to the consequences of one's acts. It is an act which is forbidden or a failure to do that which is required. Misc ...
by the employer. From the perspective of the society, such an act of
whistleblowing A whistleblower (also written as whistle-blower or whistle blower) is a person, often an employee, who reveals information about activity within a private or public organization that is deemed illegal, immoral, illicit, unsafe or fraudulent. Whi ...
can be seen as positive and is protected by law in certain situations in some jurisdictions, such as the USA. A common scenario is where a sales person makes a copy of the contact
database In computing, a database is an organized collection of data stored and accessed electronically. Small databases can be stored on a file system, while large databases are hosted on computer clusters or cloud storage. The design of databases ...
for use in their next job. Typically, this is a clear violation of their terms of employment. Notable acts of data theft include those by leaker Chelsea Manning and self-proclaimed whistleblowers
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is an American and naturalized Russian former computer intelligence consultant who leaked highly classified information from the National Security Agency (NSA) in 2013, when he was an employee and su ...
and Hervé Falciani.


Data theft methods


Thumbsucking

Thumbsucking, similar to podslurping, is the intentional or undeliberate use of a portable
USB mass storage device The USB mass storage device class (also known as USB MSC or UMS) is a set of computing communications protocols, specifically a USB Device Class, defined by the USB Implementers Forum that makes a USB device accessible to a host computing device ...
, such as a
USB flash drive Universal Serial Bus (USB) is an industry standard that establishes specifications for cables, connectors and protocols for connection, communication and power supply ( interfacing) between computers, peripherals and other computers. A bro ...
(or "thumbdrive"), to illicitly download confidential data from a network endpoint. A USB flash drive was allegedly used to remove without authorization highly classified documents about the design of U.S. nuclear weapons from a vault at Los Alamos. The threat of thumbsucking has been amplified for a number of reasons, including the following: *The storage capacity of portable USB storage devices has increased. *The cost of high-capacity portable USB storage devices has decreased. *Networks have grown more dispersed, the number of remote network access points has increased and methods of network connection have expanded, increasing the number of vectors for network infiltration.


Data Leakage

Data leak is part of insider attack that accidental or unintentional data loss because of specific circuit stances.


Investigating data theft

Techniques to investigate data theft include stochastic forensics, digital artifact analysis (especially of
USB drive A USB flash drive (also called a thumb drive) is a data storage device that includes flash memory with an integrated USB interface. It is typically removable, rewritable and much smaller than an optical disc. Most weigh less than . Since fir ...
artifacts), and other
computer forensics Computer forensics (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensica ...
techniques.


See also

* Pod slurping * Bluesnarfing * Sneakernet *
Data breach A data breach is a security violation, in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so. Other terms are unintentional information disclosure, data leak, inf ...


References


External links


USBs' Giant Sucking SoundOnline Behaviours that can Lead to Data Theft
{{DEFAULTSORT:Data Theft Data security Theft Data laws