Advanced Risk Measurement Approach to Insider Threats in Cyberspace

被引:0
|
作者
Cho, Inhyun [1 ]
Lee, Kyungho [1 ]
机构
[1] Korea Univ, CIST, Seoul 136713, South Korea
来源
关键词
Insider threat; risk measurement; data leakage; banking Sector; cyberspace;
D O I
10.1080/10798587.2015.1121617
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Inside jobs have been a source of critical threats in cyberspace. To manage such insider threats, a proper measurement approach is required for effective risk-based decision-making. The measurement approach should include insider-related information (e.g. the significance of jobs, the position level, the required authority for data, and the type of employment) in order to better measure and analyze insider risks. In this paper, we suggest an approach that takes into account the insider-related information in calculating data leakage risk of insiders in the banking sector. We implement this approach by utilizing real-world data to calculate insider risks. We present an effective risk measurement approach, which we believe can enhance decision-making process for risk management for insider threats.
引用
收藏
页码:405 / 413
页数:9
相关论文
共 50 条
  • [31] Towards a New Taxonomy of Insider Threats
    Chaipa, Sarathiel
    Ketcha Ngassam, Ernest
    Shawren, Singh
    2022 IST-AFRICA CONFERENCE, 2022,
  • [32] Techniques and countermeasures for preventing insider threats
    Alsowail R.A.
    Al-Shehari T.
    PeerJ Computer Science, 2022, 8
  • [33] Insider Threats to IT Security of Critical Infrastructures
    Gaidarski, Ivan
    Minchev, Zlatogor
    Studies in Big Data, 2021, 84 : 381 - 394
  • [34] Insider Threats: It's the HUMAN, Stupid!
    Greitzer, Frank L.
    NCS'19: PROCEEDINGS OF THE NORTHWEST CYBERSECURITY SYMPOSIUM, 2019,
  • [35] Semantic analysis for monitoring insider threats
    Symonenko, S
    Liddy, ED
    Yilmazel, O
    Del Zoppo, R
    Brown, E
    Downey, M
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2004, 3073 : 492 - 500
  • [36] Mitigating Inadvertent Insider Threats with Incentives
    Liu, Debin
    Wang, XiaoFeng
    Camp, L. Jean
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2009, 5628 : 1 - 16
  • [37] Techniques and countermeasures for preventing insider threats
    Alsowail, Rakan A.
    Al-Shehari, Taher
    PEERJ COMPUTER SCIENCE, 2022, 8
  • [38] Detecting Insider Threats: Solutions and Trends
    Zeadally, Sherali
    Yu, Byunggu
    Jeong, Dong Hyun
    Liang, Lily
    INFORMATION SECURITY JOURNAL, 2012, 21 (04): : 183 - 192
  • [39] Federated Platooning: Insider Threats and Mitigations
    Callegati, Franco
    Gabbrielli, Maurizio
    Giallorenzo, Saverio
    Melis, Andrea
    Prandini, Marco
    PROCEEDINGS OF THE 52ND ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2019, : 3222 - 3231
  • [40] Introduction to the Special Issue on Insider Threats
    Claycomb, Bill
    Greitzer, Frank
    Jaros, Stephanie L.
    Gardner, Carrie
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2022, 3 (01):