Advanced Risk Measurement Approach to Insider Threats in Cyberspace

被引:0
|
作者
Cho, Inhyun [1 ]
Lee, Kyungho [1 ]
机构
[1] Korea Univ, CIST, Seoul 136713, South Korea
来源
关键词
Insider threat; risk measurement; data leakage; banking Sector; cyberspace;
D O I
10.1080/10798587.2015.1121617
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Inside jobs have been a source of critical threats in cyberspace. To manage such insider threats, a proper measurement approach is required for effective risk-based decision-making. The measurement approach should include insider-related information (e.g. the significance of jobs, the position level, the required authority for data, and the type of employment) in order to better measure and analyze insider risks. In this paper, we suggest an approach that takes into account the insider-related information in calculating data leakage risk of insiders in the banking sector. We implement this approach by utilizing real-world data to calculate insider risks. We present an effective risk measurement approach, which we believe can enhance decision-making process for risk management for insider threats.
引用
收藏
页码:405 / 413
页数:9
相关论文
共 50 条
  • [1] Redefining insider threats: a distinction between insider hazards and insider threats
    Mathias Reveraert
    Tom Sauer
    Security Journal, 2021, 34 : 755 - 775
  • [2] Redefining insider threats: a distinction between insider hazards and insider threats
    Reveraert, Mathias
    Sauer, Tom
    SECURITY JOURNAL, 2021, 34 (04) : 755 - 775
  • [3] Mitigating Insider Threats on the Edge: A Knowledgebase Approach
    Althebyan, Qutaibah
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2020, 17 (4A) : 621 - 628
  • [4] Insider threats
    Hobbs, Christopher
    INTERNATIONAL AFFAIRS, 2019, 95 (03) : 725 - 726
  • [5] The Risk of Risk Analysis And its Relation to the Economics of Insider Threats
    Probst, Christian W.
    Hunker, Jeffrey
    ECONOMICS OF INFORMATION SECURITY AND PRIVACY, 2010, : 279 - +
  • [6] Strengthening Strategic Approach to Counter Cyberspace Threats in Nigeria
    Kademi, Anas Mu'azu
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2018), 2018, : 328 - 337
  • [7] Detecting and Identifying Insider Threats Based on Advanced Clustering Methods
    Nikiforova, Oksana
    Romanovs, Andrejs
    Zabiniako, Vitaly
    Kornienko, Jurijs
    IEEE ACCESS, 2024, 12 : 30242 - 30253
  • [8] Defense for Advanced Persistent Threat with Inadvertent and Malicious Insider Threats
    Chen, Ziqin
    Chen, Guanpu
    Hong, Yiguang
    UNMANNED SYSTEMS, 2024, 12 (02) : 341 - 358
  • [9] Micromovement Behavior as an Intention Detection Measurement for Preventing Insider Threats
    Almehmadi, Abdulaziz
    IEEE ACCESS, 2018, 6 : 40626 - 40637
  • [10] Identifying Indicators of Insider Threats: Insider IT Sabotage
    Claycomb, William R.
    Huth, Carly L.
    Phillips, Brittany
    Flynn, Lori
    McIntire, David
    2013 47TH INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2013,