Rogue Connection

From BCMpedia. A Wiki Glossary for Business Continuity Management (BCM) and Disaster Recovery (DR).
Jump to: navigation, search
1. Rogue connection refers to cyber criminals leveraging off flexible platforms such as [ (1) personal devices connected to the organisation's network, (2) work devices connected to public network or (3) leaving work devices unattended ] to gain unauthorised access and compromise the organisation's systems.

Related Term: Conduit Devices

(Source: Business Continuity Management Institute - BCM Institute)

A Manager's Guide to Business Continuity Management for Cyber Security Incident Response (2017) BUY!


2. Rogue network devices range from wireless access points and personal laptops to any unmanaged asset connected to the corporate network. Organizations manage this risk using different controls, such as Network Address Control (NAC), 801.x authentication, separate Bring Your Own Device (BYOD) networks, and scanning for non-sanctioned or unknown devices. These unmanaged devices represent a significant threat as they can provide threat actors with an extremely flexible platform to enumerate and compromise the network in ways, which IT-managed devices may restrict.
Source: (Verizon, 2016)