A Theoretical Underpinning for Examining Insider Attacks Leveraging the Fraud Pentagon

被引:0
|
作者
Padayachee, Keshnee [1 ]
机构
[1] Univ South Africa, Coll Sci Engn & Technol, Pretoria, South Africa
关键词
Insider threat; Fraud pentagon; Fraud triangle; Fraud diamond; NEUTRALIZATION; THREAT; CRIME;
D O I
10.1007/978-3-030-81111-2_15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The problem of the insider threat is extremely challenging to manage as it involves trusted entities who have legitimate authorization to the information infrastructure of an organization. It has been reasoned that the framing of the Fraud Pentagon may assist in predicting and preventing white collar crimes such as fraud. The Fraud Pentagon considers the elements of motivation, capability, rationalization, opportunity and arrogance which converge in a crime scenario. The current study considers the value of using the Fraud Pentagon in examining insider attacks. This paper evaluates this theoretical framing from an insider threat perspective, thereby assisting researchers, organizations and information security practitioners in understanding its complexity and its application to the insider threat problem.
引用
收藏
页码:179 / 188
页数:10
相关论文
共 2 条
  • [1] Getting the word out about fraud: A theoretical analysis of whistleblowing and insider trading
    Macey, Jonathan
    MICHIGAN LAW REVIEW, 2007, 105 (08) : 1899 - 1940
  • [2] A Theoretical Framework of Resilience: Biased Random Walk Routing Against Insider Attacks
    Erdene-Ochir, Ochirkhand
    Abdallah, Mohamed
    Qaraqe, Khaled
    Minier, Marine
    Valois, Fabrice
    2015 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2015, : 1602 - 1607