Best Practices against Insider Threats for All Nations

被引:0
|
作者
Flynn, Lori [1 ]
Huth, Carly [1 ]
Trzeciak, Randy [1 ]
Buttles, Palma [1 ]
机构
[1] Carnegie Mellon Univ, Inst Software Engn, CERT Program, Pittsburgh, PA 15213 USA
关键词
Insider threat; best practices; international; policies; security; information security; cultures; education;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Individuals in any nation can use this paper as 1. an exploration of international policy issues related to insider threats and other cybersecurity concerns; and 2. a succinct educational guide to practices for stopping insider threats. A framework for international analysis of cybersecurity practices is introduced. Based on its analysis of more than 700 case studies, the CERT (R) Insider Threat Center recommends 19 best practices for preventing, detecting, and responding to harm from insider threats. This paper summarizes each practice, explains its importance, and provides an international policy perspective on the practice.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Insider Threat Program Best Practices
    Guido, Mark D.
    Brooks, Marc W.
    PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 1831 - 1839
  • [2] Information Security and Insider Threats in Small Medical Practices
    Martin, Nancy L.
    Imboden, Thomas R.
    AMCIS 2014 PROCEEDINGS, 2014,
  • [3] Redefining insider threats: a distinction between insider hazards and insider threats
    Mathias Reveraert
    Tom Sauer
    Security Journal, 2021, 34 : 755 - 775
  • [4] Unleashing IoT Security: Assessing the Effectiveness of Best Practices in Protecting Against Threats
    Puetz, Philipp
    Mitev, Richard
    Miettinen, Markus
    Sadeghi, Ahmad-Reza
    39TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2023, 2023, : 190 - 204
  • [5] Mobile Security: Threats and Best Practices
    Weichbroth, Pawel
    Lysik, Lukasz
    MOBILE INFORMATION SYSTEMS, 2020, 2020
  • [6] Redefining insider threats: a distinction between insider hazards and insider threats
    Reveraert, Mathias
    Sauer, Tom
    SECURITY JOURNAL, 2021, 34 (04) : 755 - 775
  • [7] NFV: Security Threats and Best Practices
    Lal, Shankar
    Taleb, Tarik
    Dutta, Ashutosh
    IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (08) : 211 - 217
  • [8] Defending against insider threats and internal data leakage
    You, Ilsun
    Lenzini, Gabriele
    Ogiela, Marek R.
    Bertino, Elisa
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (08) : 831 - 833
  • [9] Insider threats
    Hobbs, Christopher
    INTERNATIONAL AFFAIRS, 2019, 95 (03) : 725 - 726
  • [10] Anomaly Detection Techniques for Database Protection Against Insider Threats
    Sallam, Asmaa
    Xiao, Qian
    Bertino, Elisa
    Fadolalkarim, Daren
    PROCEEDINGS OF 2016 IEEE 17TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IEEE IRI), 2016, : 20 - 29