• Latest
  • Trending
  • All
  • News
  • Business
  • Politics
  • Science
  • World
  • Lifestyle
  • Tech
Why we should care about the theft of $1

Why we should care about the theft of $1

January 28, 2023
Federal judge blocks Tennessee law restricting drag shows

Federal judge blocks Tennessee law restricting drag shows

April 1, 2023
Bill Maher Talks Of Trump, Guns And Atheists In A Lively ‘Real Time’ Exchange

Bill Maher Talks Of Trump, Guns And Atheists In A Lively ‘Real Time’ Exchange

April 1, 2023
Elon Musk Seeks To End $258 Billion Dogecoin Lawsuit

Elon Musk Seeks To End $258 Billion Dogecoin Lawsuit

April 1, 2023
Tornadoes Kill at Least 3 as Storms Tear Through Midwest and South

Storms Kill at Least 4 as Tornadoes Tear Through Midwest and South

April 1, 2023
On this day in history, April 1, 1945, US forces invade Okinawa, last major battle of World War II

On this day in history, April 1, 1945, US forces invade Okinawa, last major battle of World War II

April 1, 2023
The Beach Boys Making a Final Four Run

The Beach Boys Making a Final Four Run

April 1, 2023
Michigan Rep. Dan Kildee reveals cancer diagnosis

Michigan Rep. Dan Kildee reveals cancer diagnosis

April 1, 2023
Russia-Ukraine war: List of key events, day 402

Russia-Ukraine war: List of key events, day 402

April 1, 2023
Trump’s Romp With Stormy Daniels Spawned a Bunch of Losers

Trump’s Romp With Stormy Daniels Spawned a Bunch of Losers

April 1, 2023
‘Stolen Youth’: The Anti-Woke Book That’s Afraid of Everything

‘Stolen Youth’: The Anti-Woke Book That’s Afraid of Everything

April 1, 2023
A Once Lowly Program Gets a Second Shot at the Top

A Once Lowly Program Gets a Second Shot at the Top

April 1, 2023
Inside a New Oasis on Guatemala’s Famous Lake Atitlán

Inside a New Oasis on Guatemala’s Famous Lake Atitlán

April 1, 2023
DNYUZ
  • Home
  • News
    • U.S.
    • World
    • Politics
    • Opinion
    • Business
    • Crime
    • Education
    • Environment
    • Science
  • Entertainment
    • Culture
    • Music
    • Movie
    • Television
    • Theater
    • Gaming
    • Sports
  • Tech
    • Apps
    • Autos
    • Gear
    • Mobile
    • Startup
  • Lifestyle
    • Arts
    • Fashion
    • Food
    • Health
    • Travel
No Result
View All Result
DNYUZ
No Result
View All Result
Home News

Why we should care about the theft of $1

January 28, 2023
in News
Why we should care about the theft of $1
762
SHARES
2.2k
VIEWS
Share on FacebookShare on Twitter

User Journey Analytics: The case of the missing dollar

Imagine that the head of security at one of the nation’s leading financial institutions receives a call from their team because $500,000 went missing. After long hours of analyzing transactions, the team traces the missing money to an employee who also stole $1 six months earlier. 

The employee in question made several $1 transactions to their own account on the company’s claim settlement portal. Once the employee realized that no one was scrutinizing these transactions, they grew increasingly bolder and started embezzling more significant sums. Eventually, greed caught up when they tried sending $500,000, which is when the security team detected the incident and swung into action.

This is a real-life example from an insurance company.

Insider threat: What you can’t detect makes you vulnerable

A leading number of today’s threats to financial institutions worldwide come not just from external threats, but from within. Or by external actors using stolen credentials from authenticated users. As a result, financial institutions are tightening their security to be watchful of potential misuse or abuse from employees and contractors using their SaaS and custom-built applications.  

Cybersecurity technology solutions enable the detection of malicious activities on networks, operating systems, and devices. Malicious activity and fraud are primarily detected by two methods: 

  • Rule and signature-based detection which identifies potential malicious behavior through rules and known bad indicators. 
  • Statistical volumetric frequency methods, also known as User Entity Behavior Analytics (UEBA). 

These solutions have been effective on the network, endpoint and access layers. But when it comes down to the application layer, these methods of detection and response fall short. Assessing abnormal user behavior by average daily activities does not deliver accurate results, as there is no such thing as ‘average’ behavior.

Let’s take, for instance, a manager at an insurance company: Some of her days are spent settling claims and transferring money to client accounts. On other days she is preparing reports, and towards the end of the quarter, she spends a few days preparing a presentation of her department’s activity. Dawn doesn’t have an average daily behavior, she does different things all the time. 

So, how can we detect intentional misuse from within? We must construct user journeys across business applications and learn the typical usage patterns of internal and external users. 

User journey analytics for insider threat detection

User journey analytics does not look at a single activity from a single user. Instead, it analyzes sequences of activities from a given user and forms a set of journey profiles that this user undertakes in an application. As users perform multiple actions in different sequences and time intervals, this method learns what is considered a ‘typical’ user journey for each user. When an employee performs an action that appears outside these normative user journeys, it identifies the changed journey as an ‘outlier.’

Learning user journeys at scale to prevent threats

Let’s return to the example we started with. By deploying user journey analytics, the insurance company would have seen instances of anomalous behavior for the employee crediting $1 to their account. This anomaly would have alerted potential malicious activity, thus narrowing the focus on the employee in question and providing timely intervention. 

Doron Hendler is cofounder and CEO of RevealSecurity.

The post Why we should care about the theft of $1 appeared first on Venture Beat.

Share305Tweet191Share

Trending Posts

At least 2 killed when tornado strikes Arkansas; dangerous storms hit 15 states

At least 2 killed when tornado strikes Arkansas; dangerous storms hit 15 states

March 31, 2023
Suzanne Rheinstein, 77, Designer of Classic American Interiors, Dies

Suzanne Rheinstein, 77, Designer of Classic American Interiors, Dies

March 31, 2023

L.S.U. Rallies Against Virginia Tech to Make N.C.A.A. Championship Game

March 31, 2023
Tennessee drag ban law: Judge temporarily blocks law

Tennessee drag ban law: Judge temporarily blocks law

March 31, 2023
Heart disease, the silent killer: Study shows it can strike without symptoms

Heart disease, the silent killer: Study shows it can strike without symptoms

March 31, 2023

Copyright © 2023.

Site Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Follow Us

No Result
View All Result
  • Home
  • News
    • U.S.
    • World
    • Politics
    • Opinion
    • Business
    • Crime
    • Education
    • Environment
    • Science
  • Entertainment
    • Culture
    • Gaming
    • Music
    • Movie
    • Sports
    • Television
    • Theater
  • Tech
    • Apps
    • Autos
    • Gear
    • Mobile
    • Startup
  • Lifestyle
    • Arts
    • Fashion
    • Food
    • Health
    • Travel

Copyright © 2023.

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT