Cybersecurity: Revisiting the definition of insider threat

被引:0
|
作者
Beebe, Nicole Lang [1 ]
Chang, Frederick R. [2 ]
机构
[1] Department of Information Systems & Cyber Security, Cyber Center for Security & Analytics, University of Texas at San Antonio, United States
[2] Department of Computer Science, Darwin Institute for Cyber Security at Southern Methodist University, United States
来源
Bridge | 1600年 / 49卷 / 03期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
46
引用
收藏
页码:12 / 19
相关论文
共 50 条
  • [1] A primer on insider threats in cybersecurity
    Prabhu, Sunitha
    Thompson, Nik
    INFORMATION SECURITY JOURNAL, 2022, 31 (05): : 602 - 611
  • [2] Toward an Ontology for Insider Threat Research: Varieties of Insider Threat Definitions
    Mundie, David A.
    Perl, Sam
    Huth, Carly L.
    2013 THIRD WORKSHOP ON SOCIO-TECHNICAL ASPECTS IN SECURITY AND TRUST (STAST 2013), 2013, : 26 - 36
  • [3] Insider Threat Cybersecurity Framework Webtool & Methodology: Defending Against Complex Cyber-Physical Threats
    Mylrea, Michael
    Gourisetti, Sri Nikhil Gupta
    Larimer, Curtis
    Noonan, Christine
    2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, : 207 - 216
  • [4] Cybersecurity Advances in SCADA Systems Machine Learning-based Insider Threat Detection and Future Directions
    Al-Muntaser, Bakil
    Mohamed, Mohamad Afendee
    Tuama, Ammar Yaseen
    Rana, Imran Ahmad
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (08) : 318 - 328
  • [5] The insider threat ‘zoo’
    Renaud K.
    Warkentin M.
    Computer Fraud and Security, 2024, 2024 (05):
  • [7] Addressing the insider threat
    Application Security Inc
    Netw. Secur., 2008, 3 (11-14):
  • [8] Reflections on the insider threat
    Pfleeger, Charles P.
    INSIDER ATTACK AND CYBER SECURITY: BEYOND THE HACKER, 2008, 39 : 5 - 15
  • [9] Insider threat detection for specific threat scenarios
    Tian Tian
    Chen Zhang
    Bo Jiang
    Huamin Feng
    Zhigang Lu
    Cybersecurity, 8 (1)
  • [10] The Insider Threat in Cloud Computing
    Kandias, Miltiadis
    Virvilis, Nikos
    Gritzalis, Dimitris
    CRITICAL INFORMATION INFRASTRUCTURE SECURITY, CRITIS 2011, 2013, 6983 : 93 - 103