It’s 5 p.m. on a Friday, and you’re the lead security engineer for the headquarters site of a major corporation. Just as you’re getting ready to ease out the door for the weekend, the phone rings and there’s a frantic voice on the other end of the line.
It’s one of the managers from your financial department, and it seems that someone has accessed the payroll records of a number of higher-ranking executives within the company and attempted changes to their salaries and monthly paychecks. You immediately check the firewall and IDS logs to see if they have recorded an intrusion from the outside world into the network. They show no such illegal access. After calming down and checking your audit logs (you do audit the access of sensitive files, don’t you?), you see that a lower-level clerk responsible for processing paychecks for direct deposit has attempted to alter the data.Read Full Story