Page 115 - KDU INTERNATIONAL JOURNAL OF CRIMINAL JUSTICE
P. 115
KDU International Journal of Criminal Justice (KDUIJCJ)
Volume I | Issue II| July 2024
- Unusual data transfers: Large-scale data transfers, frequent access to
sensitive information, or copying files to external devices.
- Unusual network activity: Unusual network traffic patterns, such as high data
volume or connections to suspicious external IP addresses.
3. Behaviour Changes:
- Drastic changes in work patterns: Sudden shifts in work responsibilities,
access privileges, or job roles.
- Behavioural deviations: Significant changes in communication patterns,
interaction with colleagues, or sudden increase in privileged actions.
4. Privilege Misuse:
- Unauthorized system access: Attempts to access systems or information
beyond an individual's authorized privileges.
- Abuse of administrative rights: Unauthorized modifications to system
configurations, altering access permissions, or bypassing security controls.
5. Social Network Analysis:
- Unusual associations: Connections or communication patterns with
suspicious individuals or external entities.
- Collusion indicators: High levels of communication or interaction with known
threat actors or individuals involved in unauthorized activities.
6. Employee Behaviour:
- Behavioural red flags: Frequent instances of aggression, disgruntlement, or
conflicts with colleagues or superiors.
104