Advanced Risk Measurement Approach to Insider Threats in Cyberspace

被引:0
|
作者
Cho, Inhyun [1 ]
Lee, Kyungho [1 ]
机构
[1] Korea Univ, CIST, Seoul 136713, South Korea
来源
关键词
Insider threat; risk measurement; data leakage; banking Sector; cyberspace;
D O I
10.1080/10798587.2015.1121617
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Inside jobs have been a source of critical threats in cyberspace. To manage such insider threats, a proper measurement approach is required for effective risk-based decision-making. The measurement approach should include insider-related information (e.g. the significance of jobs, the position level, the required authority for data, and the type of employment) in order to better measure and analyze insider risks. In this paper, we suggest an approach that takes into account the insider-related information in calculating data leakage risk of insiders in the banking sector. We implement this approach by utilizing real-world data to calculate insider risks. We present an effective risk measurement approach, which we believe can enhance decision-making process for risk management for insider threats.
引用
收藏
页码:405 / 413
页数:9
相关论文
共 50 条
  • [41] Model Based Analysis of Insider Threats
    Chen, Taolue
    Han, Tingting
    Kammueller, Florian
    Nemli, Ibrahim
    Probst, Christian W.
    2016 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2016,
  • [42] A novel approach for detecting advanced persistent threats
    Al-Saraireh, Jaafer
    Masarweh, Ala'
    EGYPTIAN INFORMATICS JOURNAL, 2022, 23 (04) : 45 - 55
  • [43] The Dangers and Threats that Digital Users Face in Cyberspace
    Baltezarevic, Radoslav
    Baltezarevic, Ivana
    IPSI BGD TRANSACTIONS ON INTERNET RESEARCH, 2021, 17 (01): : 46 - 52
  • [44] From Traits to Threats: Learning Risk Indicators of Malicious Insider Using Psychometric Data
    Nanamou, N'Famoussa Kounon
    Neal, Christopher
    Boulahia-Cuppens, Nora
    Cuppens, Frederic
    Bkakria, Anis
    INFORMATION SYSTEMS SECURITY, ICISS 2024, 2025, 15416 : 180 - 200
  • [45] Threats for Women in Cyberspace: Be Protected Using Internet
    Radionova-Girsa, Elina
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON GENDER RESEARCH (ICGR 2019), 2019, : 742 - 748
  • [46] Multiple case study approach to identify aggravating variables of insider threats in information systems
    Nicho, Mathew
    Kamoun, Faouzi
    Nicho, Mathew (m.nicho1@rgu.ac.uk), 1600, Association for Information Systems (35): : 333 - 356
  • [47] Mitigating Insider Threats in a Cloud Using a Knowledgebase Approach while Maintaining Data Availability
    Althebyan, Qutaibah
    Mohawesh, Rami
    Yaseen, Qussai
    Jararweh, Yaser
    2015 10TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2015, : 226 - 231
  • [48] Multiple Case Study Approach to Identify Aggravating Variables of Insider Threats in Information Systems
    Nicho, Mathew
    Kamoun, Faouzi
    COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2014, 35 : 333 - 356
  • [49] Comparing physical protection strategies against insider threats using probabilistic risk assessment
    Bjorkman, K.
    Holmberg, J-E
    Matasniemi, T.
    NUCLEAR ENGINEERING AND DESIGN, 2022, 391
  • [50] Positioning Your Organization to Respond to Insider Threats
    Greitzer F.L.
    Purl J.
    Leong Y.M.
    Sticha P.J.
    IEEE Engineering Management Review, 1600, 47 (02): : 75 - 83