Which of the following is a technology-related indicator?

Disable ads (and more) with a membership for a one time $4.99 payment

Prepare for the Department of Defense Information Security and Insider Threat Test. Equip yourself with vital knowledge through flashcards and multiple choice questions, each with hints and explanations. Ace your exam!

The correct response identifies both options A and B as technology-related indicators associated with insider threats.

Accessing systems at unusual hours without authorization is indicative of potential malicious intent or unauthorized activity. This behavior can suggest that an individual is trying to bypass normal operational protocols, which may be indicative of an insider threat. The technology aspect here is that unauthorized access often involves manipulating information systems and networks, which directly relates to the technology used to facilitate access.

Keeping unauthorized back-ups also represents a significant risk related to information security. It suggests that data is being stored in an insecure manner or outside of official channels, which could lead to data breaches or loss of sensitive information. The relationship to technology lies in the actions taken to create and store these unauthorized backups, often involving software and hardware that do not comply with established data handling policies.

In summary, both behaviors exemplify interactions with technology that can underpin malicious insider activities, making them relevant indicators for identifying potential threats within an organization.