Addressing the Insider Threat Introduction

被引:10
|
作者
Pfleeger, Shari Lawrence [1 ]
Stolfo, Salvatore J. [2 ]
机构
[1] RAND Corp, Santa Monica, CA 90406 USA
[2] Columbia Univ, New York, NY 10027 USA
关键词
Behavior; Human factors; Insider threat; Modeling;
D O I
10.1109/MSP.2009.146
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In their guest editors' introduction to the special issue on Insider Threat, Shari Lawrence Pfleeger and Salvatore Stolfo describe a taxonomy of insiders and their unwelcome actions, as well as the need for credible data to document the size and nature of the insider threat. They suggest that the three articles in the special issue shed light not only on how to generate data for further study but also on how to use the data in models that can help evaluate the likely effects of various responses. The introduction ends with a matrix showing the variety of sensible and effective responses that must be sensitive to the organizations, systems, environments, and individuals involved with inappropriate insider behavior. © 2009 IEEE.
引用
收藏
页码:10 / 13
页数:4
相关论文
共 50 条
  • [21] Software Decoys for Insider Threat
    Park, Younghee
    Stolfo, Salvatore J.
    7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [22] Insider Threat Detection: A Review
    Manoharan, Phavithra
    Yin, Jiao
    Wang, Him
    Zhang, Yanchun
    Ye, Wenjie
    2024 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS, NANA 2024, 2024, : 147 - 153
  • [23] Intelligence Analyses and the Insider Threat
    Santos, Eugene, Jr.
    Hien Nguyen
    Yu, Fei
    Kim, Keum Joo
    Li, Deqing
    Wilkinson, John T.
    Olson, Adam
    Russell, Jacob
    Clark, Brittany
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2012, 42 (02): : 331 - 347
  • [24] Combating the insider cyber threat
    Greitzer, Frank L.
    Moore, Andrew P.
    Cappelli, Dawn M.
    Andrews, Dee H.
    Carroll, Lynn A.
    Hull, Thomas D.
    IEEE SECURITY & PRIVACY, 2008, 6 (01) : 61 - 64
  • [25] An Insider Threat Prediction Model
    Kandias, Miltiadis
    Mylonas, Alexios
    Virvilis, Nikos
    Theoharidou, Marianthi
    Gritzalis, Dimitris
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2010, 6264 : 26 - 37
  • [26] Guarding Against the Insider Threat
    Archuleta, Edmund G.
    JOURNAL AMERICAN WATER WORKS ASSOCIATION, 2009, 101 (05): : 38 - +
  • [27] Honeypots: Catching the insider threat
    Spitzner, L
    19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 170 - 179
  • [28] Insider Threat Detection in PRODIGAL
    Goldberg, Henry G.
    Young, William T.
    Reardon, Matthew G.
    Phillips, Brian J.
    Senator, Ted E.
    PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 2648 - 2657
  • [29] Safeguarding against the insider threat
    Bulpett B.
    Network Security, 2020, 2020 (06): : 14 - 17
  • [30] Balancing the insider and outsider threat
    Walton, Richard
    Limited, Walton-Mackenzie
    Computer Fraud and Security, 2006, 2006 (11): : 8 - 11