Data Exfiltration Use Case

Excerpt From SECDEF Memo - Impacts on SCIF/SAPF Security Webinar

Watch the Video Below to Learn About the Data Exfiltration Use Case

CTO Dr. Brett Walkenhorst illustrates a scenario where an insider attempts to extract classified files from a secure facility. The insider enters the building with a hotspot and a Wi-Fi dongle in order to connect and steal information over the cellular network. To get around detection sensors, they turn off the equipment. Once inside, they initiate the hotspot, link the dongle to a protected PC, and move the data. The insider can destroy the equipment to reduce the possibility of being discovered departing the building. Learn more about this explanation in the clip below.