Addressing the Insider Threat Introduction

被引:10
|
作者
Pfleeger, Shari Lawrence [1 ]
Stolfo, Salvatore J. [2 ]
机构
[1] RAND Corp, Santa Monica, CA 90406 USA
[2] Columbia Univ, New York, NY 10027 USA
关键词
Behavior; Human factors; Insider threat; Modeling;
D O I
10.1109/MSP.2009.146
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In their guest editors' introduction to the special issue on Insider Threat, Shari Lawrence Pfleeger and Salvatore Stolfo describe a taxonomy of insiders and their unwelcome actions, as well as the need for credible data to document the size and nature of the insider threat. They suggest that the three articles in the special issue shed light not only on how to generate data for further study but also on how to use the data in models that can help evaluate the likely effects of various responses. The introduction ends with a matrix showing the variety of sensible and effective responses that must be sensitive to the organizations, systems, environments, and individuals involved with inappropriate insider behavior. © 2009 IEEE.
引用
收藏
页码:10 / 13
页数:4
相关论文
共 50 条
  • [1] Addressing the insider threat
    Application Security Inc
    Netw. Secur., 2008, 3 (11-14):
  • [2] Inside the Insider Threat (Introduction)
    Bishop, Matt
    Nance, Kara
    Clark, Jason
    PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 2637 - 2637
  • [3] Inside the Insider Threat (Introduction)
    Bishop, Matt
    Nance, Kara
    Claycomb, William
    PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016), 2016, : 2728 - 2728
  • [4] Introduction to Inside the Insider Threat Minitrack
    Clark, Jason W.
    PROCEEDINGS OF THE 52ND ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2019, : 3200 - 3201
  • [5] Introduction to the inside the insider threat Minitrack
    Bishop, Matt
    Nance, Kara
    Claycomb, William
    Proceedings of the Annual Hawaii International Conference on System Sciences, 2016, 2016-March
  • [6] Introduction to Insider Threat Modeling, Detection, and Mitigation Track
    Dodge, Ronald C., Jr.
    Ferguson, Aaron J.
    Cappelli, Dawn M.
    PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 1812 - 1812
  • [7] Introduction to the special issue on insider threat modeling and simulation
    Moore, Andrew P.
    Kennedy, Kirk A.
    Dover, Thomas J.
    COMPUTATIONAL AND MATHEMATICAL ORGANIZATION THEORY, 2016, 22 (03) : 261 - 272
  • [8] Introduction to insider threat modeling, detection, and mitigation track
    Dodge Jr., Ronald C.
    Ferguson, Aaron J.
    Cappelli, Dawn M.
    Proceedings of the Annual Hawaii International Conference on System Sciences, 2012,
  • [9] Introduction to the special issue on insider threat modeling and simulation
    Andrew P. Moore
    Kirk A. Kennedy
    Thomas J. Dover
    Computational and Mathematical Organization Theory, 2016, 22 : 261 - 272
  • [10] Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
    Choi, Sung
    Zage, David
    46TH ANNUAL 2012 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, 2012, : 147 - 153